FTL VS ip-blindness

Compare FTL vs ip-blindness and see what are their differences.

Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
FTL ip-blindness
158 7
1,293 115
1.7% -
8.1 0.7
5 days ago about 1 year ago
C
GNU General Public License v3.0 or later -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

FTL

Posts with mentions or reviews of FTL. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-06-07.

ip-blindness

Posts with mentions or reviews of ip-blindness. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-06-08.
  • Intelligent Tracking Prevention is getting even stronger by also hiding the user’s IP address from trackers on IOS 15
    3 projects | /r/adops | 8 Jun 2021
    More here: https://github.com/bslassey/ip-blindness
  • 3rd party tags - Chrome
    1 project | /r/adops | 11 May 2021
    Yes, but have in mind that in a future it may not be possible. Take a look to the Gnatcatcher proposal: https://github.com/bslassey/ip-blindness
  • I Work on Ads at Google
    5 projects | news.ycombinator.com | 6 May 2021
    > at the very least, the ad network will be able to see your IP and know that you like athletic shoes and visited www.wereallylikeshoes.com. If you visit some other domain first-ad-network.com owns with the same IP it within a small window of time, it can be pretty confident it's the same person and even store some client side data at that point. It feels like they can construct a reasonably good profile about their users by using that technique.

    Yes, there are a lot of user identifying bits in an IP address. Chrome has two proposals: https://github.com/bslassey/ip-blindness I'm not sure what other browsers are thinking?

    > That's considering the browser doesn't leak out any other potentially identifying information.

    Which they definitely do. All the browsers are working on figuring out how to thwart fingerprinting, and it's really hard. I am glad, at least, that we were able to get Google Ads to publicly commit to not fingerprinting.

    > when you click on the ad, they know one interest about you and, if you clicked in ads from other campaigns they run, they may reconstruct your profile well

    Yes, when people click on ads in Turtledove the advertiser does learn something. This is a huge improvement to the status quo where advertisers learn things just by bidding, or an intermediate stage where advertisers learn things when they win an auction -- users don't click on ads very often, so the amount of information leaked this way is very low.

    Exactly how much information the advertiser is able to learn on a click is still very much up in the air, so if you have views on this you might consider participating on the repo?

  • AdGuard publishes a list of 6K+ trackers abusing the CNAME cloaking technique
    6 projects | news.ycombinator.com | 4 Mar 2021
    "Near-path NAT"[1] has been suggested as a mechanism that browsers can use to proxy requests through an intermediate server, similar to what you suggest.

    [1] https://github.com/bslassey/ip-blindness/blob/master/near_pa...

  • Google to stop selling ads based on your specific web browsing
    11 projects | news.ycombinator.com | 3 Mar 2021
    > and you know my IP address

    https://www.chromium.org/Home/chromium-privacy/privacy-sandb... links to https://github.com/bslassey/ip-blindness for how they intend to handle this.

    (Disclosure: I work on ads at Google, speaking only for myself)

  • Google says it may have found a privacy-friendly substitute to cookies
    5 projects | news.ycombinator.com | 25 Jan 2021
    If you want to prevent fingerprinting, you need to look at where the identifying bits are coming from. (ex: https://coveryourtracks.eff.org/) The IP address provides enough bits to uniquely identify many users, and when combined with just a few more bits, to identify almost anyone.

    TOR is one solution here, which you could potentially also describe as "adding forced MitM to every connection". The proposals in https://github.com/bslassey/ip-blindness/blob/master/near_pa... and https://github.com/bslassey/ip-blindness/blob/master/willful... have different tradeoffs than TOR, with the "TOR is painfully slow" problem being a big one.

    If you have better ideas, though, I would be very interested in reading them!

What are some alternatives?

When comparing FTL and ip-blindness you can also consider the following projects:

Pi-hole - A black hole for Internet advertisements

privacy-preserving-ads - Privacy-Preserving Ads

web - Pi-hole Dashboard for stats and more

turtledove - TURTLEDOVE

AdGuardHome - Network-wide ads & trackers blocking DNS server

floc - This proposal has been replaced by the Topics API.

stealth - :rocket: Stealth - Secure, Peer-to-Peer, Private and Automateable Web Browser/Scraper/Proxy

cname-trackers - This repository contains a list of popular CNAME trackers

ads-privacy

metadata - This repository contains the data behind our Security, Privacy and Parental Control features.