cname-trackers VS ip-blindness

Compare cname-trackers vs ip-blindness and see what are their differences.

Our great sponsors
  • SurveyJS - Open-Source JSON Form Builder to Create Dynamic Forms Right in Your App
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
cname-trackers ip-blindness
25 7
370 115
1.1% -
8.0 0.7
5 days ago about 1 year ago
JavaScript
MIT License -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

cname-trackers

Posts with mentions or reviews of cname-trackers. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-08-21.

ip-blindness

Posts with mentions or reviews of ip-blindness. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-06-08.
  • Intelligent Tracking Prevention is getting even stronger by also hiding the user’s IP address from trackers on IOS 15
    3 projects | /r/adops | 8 Jun 2021
    More here: https://github.com/bslassey/ip-blindness
  • 3rd party tags - Chrome
    1 project | /r/adops | 11 May 2021
    Yes, but have in mind that in a future it may not be possible. Take a look to the Gnatcatcher proposal: https://github.com/bslassey/ip-blindness
  • I Work on Ads at Google
    5 projects | news.ycombinator.com | 6 May 2021
    > at the very least, the ad network will be able to see your IP and know that you like athletic shoes and visited www.wereallylikeshoes.com. If you visit some other domain first-ad-network.com owns with the same IP it within a small window of time, it can be pretty confident it's the same person and even store some client side data at that point. It feels like they can construct a reasonably good profile about their users by using that technique.

    Yes, there are a lot of user identifying bits in an IP address. Chrome has two proposals: https://github.com/bslassey/ip-blindness I'm not sure what other browsers are thinking?

    > That's considering the browser doesn't leak out any other potentially identifying information.

    Which they definitely do. All the browsers are working on figuring out how to thwart fingerprinting, and it's really hard. I am glad, at least, that we were able to get Google Ads to publicly commit to not fingerprinting.

    > when you click on the ad, they know one interest about you and, if you clicked in ads from other campaigns they run, they may reconstruct your profile well

    Yes, when people click on ads in Turtledove the advertiser does learn something. This is a huge improvement to the status quo where advertisers learn things just by bidding, or an intermediate stage where advertisers learn things when they win an auction -- users don't click on ads very often, so the amount of information leaked this way is very low.

    Exactly how much information the advertiser is able to learn on a click is still very much up in the air, so if you have views on this you might consider participating on the repo?

  • AdGuard publishes a list of 6K+ trackers abusing the CNAME cloaking technique
    6 projects | news.ycombinator.com | 4 Mar 2021
    "Near-path NAT"[1] has been suggested as a mechanism that browsers can use to proxy requests through an intermediate server, similar to what you suggest.

    [1] https://github.com/bslassey/ip-blindness/blob/master/near_pa...

  • Google to stop selling ads based on your specific web browsing
    11 projects | news.ycombinator.com | 3 Mar 2021
    > and you know my IP address

    https://www.chromium.org/Home/chromium-privacy/privacy-sandb... links to https://github.com/bslassey/ip-blindness for how they intend to handle this.

    (Disclosure: I work on ads at Google, speaking only for myself)

  • Google says it may have found a privacy-friendly substitute to cookies
    5 projects | news.ycombinator.com | 25 Jan 2021
    If you want to prevent fingerprinting, you need to look at where the identifying bits are coming from. (ex: https://coveryourtracks.eff.org/) The IP address provides enough bits to uniquely identify many users, and when combined with just a few more bits, to identify almost anyone.

    TOR is one solution here, which you could potentially also describe as "adding forced MitM to every connection". The proposals in https://github.com/bslassey/ip-blindness/blob/master/near_pa... and https://github.com/bslassey/ip-blindness/blob/master/willful... have different tradeoffs than TOR, with the "TOR is painfully slow" problem being a big one.

    If you have better ideas, though, I would be very interested in reading them!

What are some alternatives?

When comparing cname-trackers and ip-blindness you can also consider the following projects:

cname-cloaking-blocklist - A list of domains used by tracking companies as CNAME destination when disguising third-party trackers as first-party trackers.

FTL - The Pi-hole FTL engine

stealth - :rocket: Stealth - Secure, Peer-to-Peer, Private and Automateable Web Browser/Scraper/Proxy

privacy-preserving-ads - Privacy-Preserving Ads

wirehole - WireHole is a combination of WireGuard, Pi-hole, and Unbound in a docker-compose project with the intent of enabling users to quickly and easily create a personally managed full or split-tunnel WireGuard VPN with ad blocking capabilities thanks to Pi-hole, and DNS caching, additional privacy options, and upstream providers via Unbound.

turtledove - TURTLEDOVE

WebKit - Home of the WebKit project, the browser engine used by Safari, Mail, App Store and many other applications on macOS, iOS and Linux.

floc - This proposal has been replaced by the Topics API.

pihole-regex - Custom regex filter list for use with Pi-hole.

ads-privacy

AdguardFilters - AdGuard Content Blocking Filters