-
Notifications
You must be signed in to change notification settings - Fork 2
Expand file tree
/
Copy pathtools.html
More file actions
141 lines (139 loc) · 7.17 KB
/
tools.html
File metadata and controls
141 lines (139 loc) · 7.17 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
---
layout: default
title: Data Transparency Lab Team
---
<section id="introduction" class="section2">
<h2> DTL Tools </h2>
<section class="introduction">
<p>
DTL supports different tools intended to shed light on
how personal data is used by websites and applications.
</p>
<br>
</section>
<div class="clear"><div class="divider-line"></div></div>
<section id="tools" class="section2">
<div class="container-fluid topics">
<h4>Some of the Tools promoted by DTL</h4>
<div class="row">
<!-- 1 -->
<div class="col-sm-4 col-md-4 col-lg-4 left-aligned">
<a href="http://floodwatch.o-c-r.org/" target="_blank">
<div class="topic-title">Floodwatch</div>
</a>
<p>
Floodwatch is a Chrome extension that can be downloaded from
<a href="https://chrome.google.com/webstore/detail/floodwatch/lnnmlfhgefcbnolklnepapefmmobedld">
Chrome Store </a>. This extension tracks the ads you see as you
browse the Internet and helps you understand both the volume and the
types of ads you’re being served during the course of normal
browsing. The goal is increasing awareness of how advertisers
track your browsing behavior, build their version of your online
identity, and target their ads to you as an individual.
<a href="http://floodwatch.o-c-r.org/" target="_blank" style="border-bottom:0px;">
<i class="fa fa-external-link fa-1x" style="color:#424242;"></i>
</a>
</p>
</div>
<!-- 2 -->
<div class="col-sm-4 col-md-4 col-lg-4 left-aligned">
<a href="http://sheriff.dynu.com/" target="_blank">
<div class="topic-title">$heriff</div>
</a>
<p>
$heriff is an experimental service that allows users to search for traces of
price discrimination in the Internet. It let users knows whether
e-retailers vary their prices dynamically based on the information
that they can collect online for the potential customer (such as her
location, browser/OS, incoming link, navigation history, etc.).
$heriff can be installed from <a
href="https://addons.mozilla.org/en-US/firefox/addon/sheriff_v2/?">
Firefox Add-on Store </a> and <a
href="https://chrome.google.com/webstore/detail/heriffv2/emobhicogmenmngifjhjbfliohhjijjl">
Chrome Store </a>
<a href="http://sheriff.dynu.com/" target="_blank" style="border-bottom:0px;">
<i class="fa fa-external-link fa-1x" style="color:#424242;"></i>
</a>
</p>
</div>
<!-- 3 -->
<div class="col-sm-4 col-md-4 col-lg-4 left-aligned">
<a href="http://www.fdvt.org" target="_blank">
<div class="topic-title">Facebook Data Valuation Tool (FDVT)</div>
</a>
<p>
Facebook Data Valuation Tool is a browser plugin that allows users
to understand how much money Facebook makes thanks to their online
activity. The plugin monitors the ads you are been displayed and
the ads in which you click in, and based on Facebook information
it estimates the amount of money Facebook makes thanks to them.
If you are using Chrome, you can already a version from the
<a href="https://chrome.google.com/webstore/detail/facebook-data-valuation-t/blednbbpnnambjaefhlocghajeohlhmh"> Chrome Store </a>.
This tool has been developed by Carlos III University, which
was awarded with one of the 2015 DTL Grants.
<a href="http://www.fdvt.org/" target="_blank" style="border-bottom:0px;">
<i class="fa fa-external-link fa-1x" style="color:#424242;"></i>
</a>
</p>
</div>
<!-- 4 -->
<div class="col-sm-4 col-md-4 col-lg-4 left-aligned">
<a href="https://webtransparency.cs.princeton.edu/webcensus/" target="_blank">
<div class="topic-title">Princeton Web Census</div>
</a>
<p>
This tool provides information about the measurements performed on
1 million web sites. The measurements were focused on identifying
the tracking techniques used by those websites, both stateful
(cookie-based) and stateless (fingerprinting-based). The tool can
be used to check which tracking techniques are used by a given
website or to check how widely used a given tracking technology is.
This tool has been developed by Princeton University, which
was awarded with one of the 2015 DTL Grants.
<a href="https://webtransparency.cs.princeton.edu/webcensus/" target="_blank" style="border-bottom:0px;">
<i class="fa fa-external-link fa-1x" style="color:#424242;"></i>
</a>
</p>
</div>
<!-- 5 -->
<div class="col-sm-4 col-md-4 col-lg-4 left-aligned">
<a href="https://recon.meddle.mobi/" target="_blank">
<div class="topic-title">ReCon</div>
</a>
<p>
This tool shows users what information is being sent by mobile
applications to third parties, including understanding how companies
are tracking their movements in their day-to-day life.
ReCon detects device/user identifiers used in tracking, geolocation
leaks, unsafe password transmissions, and personal information such
as name, address, gender, and relationship status. This information
is available to users via a private Web page, and ReCon allows them
to provide feedback on whether important leaks have been found, and
whether the leak should be blocked or the information sent modified.
<a href="https://recon.meddle.mobi/" target="_blank" style="border-bottom:0px;">
<i class="fa fa-external-link fa-1x" style="color:#424242;"></i>
</a>
</p>
</div>
<!-- 6 -->
<div class="col-sm-4 col-md-4 col-lg-4 left-aligned">
<a href="tools/recon/" target="_blank">
<div class="topic-title">ReCon Visualization</div>
</a>
<p>
This tool, developed by the Data Transparency Lab, shows
the information gathered by <a href="http://recon.meddle.mobi/"> ReCon Project </a>
in a way that let users understand what is going on with the applications
they use in their smartphones. For instance, it lets users identify the Applications that leak the most Personal Information and the
domains that aggregate more Personal Information from users. You can
use this tool directly at the <a href="tools/recon"> DTl website</a>
<a href="tools/recon/" target="_blank" style="border-bottom:0px;">
<i class="fa fa-external-link fa-1x" style="color:#424242;"></i>
</a>
</p>
</div>
<div class="clearfix visible-sm-block"></div>
</div>
</div>
</section>
</section>