User Workspace, IT Security
18 stories
·
0 followers

Halodoc uses AI to improve how doctors receive feedback

1 Share

Due to Indonesia’s vast size and population, timely and reliable access to healthcare can sometimes be a challenge. Halodoc aims to change that with a mobile first-telemedicine platform that connects Indonesians to doctors and helps them arrange appointments, medicine deliveries and tests. 


What’s distinctive about the Halodoc platform is that it draws on human-centered artificial intelligence: a promising new area of research that uses continuous human feedback to improve how AI systems work, and provides a better experience for the people who rely on those systems. 


With support from Google’s Late Stage Accelerator, a program that assists high-potential startups, we assembled a team of doctors, data scientists, engineers, product managers and researchers to determine how technology could support Indonesian doctors’ work. One particular approach the team identified was using AI to replicate the mentoring and feedback that junior doctors receive from more experienced colleagues in hospitals—a process that’s important to improving quality of care, but is hard to reproduce on a larger scale.  


We set out to create an easy way to provide feedback in virtual health, and worked with Google’s machine learning experts in the Late-Stage Accelerator to determine the best approach. With Google’s guidance, Halodoc's engineers applied Natural Language Processing in Bahasa Indonesia to measure, rank, and provide insights that can inform doctors’ decisions across the country—using thousands of consultations to train their machine learning models. 


When doctors open the Halodoc app, they see information on how they performed based on their response time and quality index metrics, along with suggested actions on how they can improve their consultation quality.  They also have the option of receiving further feedback and coaching from more senior doctors if needed. 


Right now, more than five percent of Indonesians use Halodoc’s platform. As a result of applying AI principles to improve the quality of care that patients experience, our app ratings have increased from 4.5 to 4.8 stars in fewer than six months, while our overall doctor scores have improved by 64 percent.

Halodoc's app interface.

Halodoc’s telemedicine app enables doctors to deliver personalized feedback with assistance from ML-enabled insights that improve patient care.

From here, with Google’s help, we hope to continue simplifying Indonesia’s healthcare infrastructure and advance the application of AI in healthcare globally.

Read the whole story
antong
1260 days ago
reply
Jakarta
Share this story
Delete

LIVE FROM #ISC2CONGRESS: Theresa Payton - Stop Blaming the User

1 Comment

Theresa-paytonStop saying humans are the weakest link in security. That was the main message delivered by former White House CIO Theresa Payton during her keynote at (ISC)2’s Congress 2018, taking place this week in New Orleans.

“The technology is the weakest link. The human is at risk. We have to change how we think about this in our industry,” said Payton, who is now president and CEO of Fortalice Solutions, and stars in the CBS show “Hunted.”

Even though cybersecurity teams implement various measures, follow rules and frameworks, and complete compliance checklists, breaches still occur, she said. That’s because technology is designed to be open for interoperability and usability. Rather than blame users, a better approach to security is needed.

“Let’s assume users are making mistakes as they are doing their job. Let’s assume technology will fail them. When you do, you’ll think differently about securing their data.” Payton advised taking a “warm embrace” approach to make users feel comfortable with technology, rather than fear it.

She shared an anecdote from her White House days, during the George W. Bush administration, about users waiting too long to report missing Blackberry mobile devices. It turned out they had been given strict, scary instructions when receiving the devices, which made them hesitate to report losses. So, instead, Payton’s team started handing out the devices in a bag with presidential M&Ms and other swag, and a phone number to call if the device ever went missing. Problem solved.

Louder and Faster Doesn’t Work

“When bad things happen,” Payton said, the reaction is to train users and explain things. But a common mistake is to talk louder and faster, which doesn’t work, she said. It makes more sense to design policies around people. “Walk around and ask your users and your customers how technology supports them doing their job, and just listen. Listen to those cues around security.”

Other measures that improve security, she said, include segmentation, multifactor authentication and new technologies such as artificial intelligence and blockchain. Regarding segmentation, Payton used a White House-related example. During her two and half years as CIO, the practice was to separate the president’s schedule from everything else so it wouldn’t fall into the wrong hands. The point: Safeguard your most valued data by isolating and creating extra barriers around it.

Going forward, she said, machine learning and blockchain will play important roles. She compared blockchain to a squirrel hiding nuts in different places for winter. With blockchain, pieces of data are spread out and hidden, then monitored every 10 minutes to make sure they are sill there.

Reasons to Worry

Payton said some possible scenarios keep her up at night. For instance, she worries about a man-made disaster planned to coincide with a major cyber attack. She also frets about the spread of misinformation on social media and its potential impact on elections and business operations.

On the positive side, she said, “we are doing a better job of educating the user.” But more work is needed, and that includes resisting the temptation to treat the user as the problem and, instead, develop policies and practices to produce better security outcomes.

Read the whole story
antong
2014 days ago
reply
Interesting
Jakarta
Share this story
Delete

A look at Arch Linux based Antergos

1 Comment

So, I’ve mentioned a few times for my love of Arch Linux and Manjaro, but there is another player in the mix that deserves due diligence, and has actually won over my personal use vote as well; Antergos.

The main difference between Antergos and Manjaro is updates and repositories. Manjaro holds updates for further testing, Antergos does not, and Antergos uses the Arch repos directly.

That said, when you are finished installing Antergos, you are essentially left with an Arch Linux system that has a few extra bells and whistles installed, where as Manjaro is Manjaro, based on Arch. This is over-simplifying, but the essential core difference.

Antergos can be downloaded from the homepage, and comes in either a minimal ISO or a live ISO. Both are graphically bootable and use graphical installers, it’s just that one will allow you to boot into a live system and try things first, the other will not.

The installation tool is very simple to use, and anyone with prior installation experience will have absolutely no problems using it.

During installation, you have the option of choosing from a large variety of desktop environments, I opted for Cinnamon, and so the screenshots and applications installed for this will reflect that.

Another part of the installation that I enjoyed seeing, was a screen that asked if you wanted various software such as Office software, firewall, Firefox, Chromium etc – or not. This helps cut down on the bloat of the system and gear the installation to your desires and needs.

My specs:

Intel(R) Core (TM) i5-4430 @ 3Ghz
• 16GB DDR3 @ 1600Mhz
• Nvidia GeForce GTX 1060 3GB
• 7200RPM HDD
• Three monitors, DVI and HDMI connected to GPU, VGA connected to motherboard

First impression, and software

I have to say that I was very impressed by Antergos. I ran into no issue where nomodeset was needed to boot into either the installer or my booted system, and after installing the package ‘nvidia’ from my package manager, my GPU was working fine as can be. Antergos is also the first distribution I have come across where the slightly awkward way I have my three monitors set up, worked almost flawlessly. As soon as my GPU driver was installed and I reboot, all three monitors worked as intended, even though two of them are in my GPU and one connected to my motherboard. This works flawlessly in Windows, but Antergos also did this; a huge selling point for me.

antergos package manager

Antergos has Pamac installed for its graphical package management utility, as well as just about everything the average user may need, or not need – depending on the software you selected to include during installation. For example, I chose not to include the neccessities for printing, as I don’t own a printer. I also chose Firefox over Chromium, and I opted to install office software and a firewall; just for a couple of ideas.

The system ran like a dream on my rig, with no hiccupps, errors, or slowdowns.

Resource Usage

Antergos Resources

 

Antergos running Cinnamon was not as heavy on the resources as I thought it might be actually, using around 1.5GB of RAM with barely any CPU use.

Final Thoughts

I was sold as soon as my three monitors worked essentially out of the box. However, the stability, ease of use and installation of Antergos leaving me with my lovely Arch Linux system, without the hassle of the usual text install, and enough customization during the installation that it still feels like it’s ‘mine’ has personally shifted Antergos to my current daily driver when booting into a GNU/Linux OS.

Granted, it’s going to have the same potential stability issues that Arch has, but really, Arch isn’t nearly as unstable nowadays as it used to be in my opinion, and I quite look forward to seeing how this Antergos system works for me in the longer run.

I don’t really ‘do’ rating systems, but I give Antergos 5 out of 5 just for the heck of it.

Now you! Have you used Antergos? What were your thoughts of it?

Ghacks needs you. You can find out how to support us here or support the site directly by becoming a Patreon. Thank you for being a Ghacks reader.

The post A look at Arch Linux based Antergos appeared first on gHacks Technology News.

Read the whole story
antong
2349 days ago
reply
Used Manjaro for one month, now downloaded Artix for Monday test of use
Jakarta
Share this story
Delete

Windows 10 Creators Update and PowerShell DSC

1 Comment and 3 Shares

For those of you who are using or planning to update the Windows 10 Creators Update, we want to make you aware of some issues that we have discovered in DSC. The following scenario is an issue in this release:

  • In PowerShell ISE, Visual Studio code or on the command line, you receive the following error when trying to import PsDscResources in a DSC configuration:DscResourceError

We have a fix for this issue and are working diligently to get it released as soon as possible. We will let you know in a few days when you can expect to get your hands on the fix. 

We are also investigating some other potential issues with DSC while running in Strict Mode and will reply to this post when we know more.

Mark Gray
Senior Program Manager
The PowerShell Team

Read the whole story
antong
2529 days ago
reply
So DSC for W10Creator, via Powershell?
Jakarta
Share this story
Delete

The Democratization of Censorship

1 Comment and 8 Shares

John Gilmore, an American entrepreneur and civil libertarian, once famously quipped that “the Internet interprets censorship as damage and routes around it.” This notion undoubtedly rings true for those who see national governments as the principal threats to free speech.

However, events of the past week have convinced me that one of the fastest-growing censorship threats on the Internet today comes not from nation-states, but from super-empowered individuals who have been quietly building extremely potent powerful cyber weapons with transnational reach.

underwater

More than 20 years after Gilmore first coined that turn of phrase, his most notable quotable has effectively been inverted — “Censorship can in fact route around the Internet.” The Internet can’t route around censorship when the censorship is all-pervasive and armed with, for all practical purposes, near-infinite reach and capacity. I call this rather unwelcome and hostile development the “The Democratization of Censorship.”

Allow me to explain how I arrived at this unsettling conclusion. As many of you know, my site was taken offline for the better part of this week. The outage came in the wake of a historically large distributed denial-of-service (DDoS) attack which hurled so much junk traffic at Krebsonsecurity.com that my DDoS protection provider Akamai chose to unmoor my site from its protective harbor.

Let me be clear: I do not fault Akamai for their decision. I was a pro bono customer from the start, and Akamai and its sister company Prolexic have stood by me through countless attacks over the past four years. It just so happened that this last siege was nearly twice the size of the next-largest attack they had ever seen before. Once it became evident that the assault was beginning to cause problems for the company’s paying customers, they explained that the choice to let my site go was a business decision, pure and simple.

Nevertheless, Akamai rather abruptly informed me I had until 6 p.m. that very same day — roughly two hours later — to make arrangements for migrating off their network. My main concern at the time was making sure my hosting provider wasn’t going to bear the brunt of the attack when the shields fell. To ensure that absolutely would not happen, I asked Akamai to redirect my site to 127.0.0.1 — effectively relegating all traffic destined for KrebsOnSecurity.com into a giant black hole.

Today, I am happy to report that the site is back up — this time under Project Shield, a free program run by Google to help protect journalists from online censorship. And make no mistake, DDoS attacks — particularly those the size of the assault that hit my site this week — are uniquely effective weapons for stomping on free speech, for reasons I’ll explore in this post.

Google's Project Shield is now protecting KrebsOnSecurity.com

Google’s Project Shield is now protecting KrebsOnSecurity.com

Why do I speak of DDoS attacks as a form of censorship? Quite simply because the economics of mitigating large-scale DDoS attacks do not bode well for protecting the individual user, to say nothing of independent journalists.

In an interview with The Boston Globe, Akamai executives said the attack — if sustained — likely would have cost the company millions of dollars. In the hours and days following my site going offline, I spoke with multiple DDoS mitigation firms. One offered to host KrebsOnSecurity for two weeks at no charge, but after that they said the same kind of protection I had under Akamai would cost between $150,000 and $200,000 per year.

Ask yourself how many independent journalists could possibly afford that kind of protection money? A number of other providers offered to help, but it was clear that they did not have the muscle to be able to withstand such massive attacks.

I’ve been toying with the idea of forming a 501(c)3 non-profit organization — ‘The Center for the Defense of Internet Journalism’, if you will — to assist Internet journalists with obtaining the kind of protection they may need when they become the targets of attacks like the one that hit my site.  Maybe a Kickstarter campaign, along with donations from well-known charitable organizations, could get the ball rolling.  It’s food for thought.

CALIBRATING THE CANNONS

Earlier this month, noted cryptologist and security blogger Bruce Schneier penned an unusually alarmist column titled, “Someone Is Learning How to Take Down the Internet.” Citing unnamed sources, Schneier warned that there was strong evidence indicating that nation-state actors were actively and aggressively probing the Internet for weak spots that could allow them to bring the entire Web to a virtual standstill.

“Someone is extensively testing the core dcore defensive capabilities of the companies that provide critical Internet services,” Schneier wrote. “Who would do this? It doesn’t seem like something an activist, criminal, or researcher would do. Profiling core infrastructure is common practice in espionage and intelligence gathering. It’s not normal for companies to do that.”

Schneier continued:

“Furthermore, the size and scale of these probes — and especially their persistence — points to state actors. It feels like a nation’s military cyber command trying to calibrate its weaponry in the case of cyberwar. It reminds me of the US’s Cold War program of flying high-altitude planes over the Soviet Union to force their air-defense systems to turn on, to map their capabilities.”

Whether Schneier’s sources were accurate in their assessment of the actors referenced in his blog post is unknown. But as my friend and mentor Roland Dobbins at Arbor Networks eloquently put it, “When it comes to DDoS attacks, nation-states are just another player.”

“Today’s reality is that DDoS attacks have become the Great Equalizer between private actors & nation-states,” Dobbins quipped.

UM…YOUR RERUNS OF ‘SEINFELD’ JUST ATTACKED ME

What exactly was it that generated the record-smashing DDoS of 620 Gbps against my site this week? Was it a space-based weapon of mass disruption built and tested by a rogue nation-state, or an arch villain like SPECTRE from the James Bond series of novels and films? If only the enemy here was that black-and-white.

No, as I reported in the last blog post before my site was unplugged, the enemy in this case was far less sexy. There is every indication that this attack was launched with the help of a botnet that has enslaved a large number of hacked so-called “Internet of Things,” (IoT) devices — mainly routers, IP cameras and digital video recorders (DVRs) that are exposed to the Internet and protected with weak or hard-coded passwords. Most of these devices are available for sale on retail store shelves for less than $100, or — in the case of routers — are shipped by ISPs to their customers.

Some readers on Twitter have asked why the attackers would have “burned” so many compromised systems with such an overwhelming force against my little site. After all, they reasoned, the attackers showed their hand in this assault, exposing the Internet addresses of a huge number of compromised devices that might otherwise be used for actual money-making cybercriminal activities, such as hosting malware or relaying spam. Surely, network providers would take that list of hacked devices and begin blocking them from launching attacks going forward, the thinking goes.

As KrebsOnSecurity reader Rob Wright commented on Twitter, “the DDoS attack on @briankrebs feels like testing the Death Star on the Millennium Falcon instead of Alderaan.” I replied that this maybe wasn’t the most apt analogy. The reality is that there are currently millions — if not tens of millions — of insecure or poorly secured IoT devices that are ripe for being enlisted in these attacks at any given time. And we’re adding millions more each year.

I suggested to Mr. Wright perhaps a better comparison was that ne’er-do-wells now have a virtually limitless supply of Stormtrooper clones that can be conscripted into an attack at a moment’s notice.

A scene from the 1978 movie Star Wars, which the Death Star tests its firepower by blowing up a planet.

A scene from the 1977 movie Star Wars, in which the Death Star tests its firepower by blowing up a planet.

SHAMING THE SPOOFERS

The problem of DDoS conscripts goes well beyond the millions of IoT devices that are shipped insecure by default: Countless hosting providers and ISPs do nothing to prevent devices on their networks from being used by miscreants to “spoof” the source of DDoS attacks.

As I noted in a November 2015 story, The Lingering Mess from Default Insecurity, one basic step that many ISPs can but are not taking to blunt these attacks involves a network security standard that was developed and released more than a dozen years ago. Known as BCP38, its use prevents insecure resources on an ISPs network (hacked servers, computers, routers, DVRs, etc.) from being leveraged in such powerful denial-of-service attacks.

Using a technique called traffic amplification and reflection, the attacker can reflect his traffic from one or more third-party machines toward the intended target. In this type of assault, the attacker sends a message to a third party, while spoofing the Internet address of the victim. When the third party replies to the message, the reply is sent to the victim — and the reply is much larger than the original message, thereby amplifying the size of the attack.

BCP38 is designed to filter such spoofed traffic, so that it never even traverses the network of an ISP that’s adopted the anti-spoofing measures. However, there are non-trivial economic reasons that many ISPs fail to adopt this best practice. This blog post from the Internet Society does a good job of explaining why many ISPs ultimately decide not to implement BCP38.

Fortunately, there are efforts afoot to gather information about which networks and ISPs have neglected to filter out spoofed traffic leaving their networks. The idea is that by “naming and shaming” the providers who aren’t doing said filtering, the Internet community might pressure some of these actors into doing the right thing (or perhaps even offer preferential treatment to those providers who do conduct this basic network hygiene).

A research experiment by the Center for Applied Internet Data Analysis (CAIDA) called the “Spoofer Project” is slowly collecting this data, but it relies on users voluntarily running CAIDA’s software client to gather that intel. Unfortunately, a huge percentage of the networks that allow spoofing are hosting providers that offer extremely low-cost, virtual private servers (VPS). And these companies will never voluntarily run CAIDA’s spoof-testing tools.

CAIDA's Spoofer Project page.

CAIDA’s Spoofer Project page.

As a result, the biggest offenders will continue to fly under the radar of public attention unless and until more pressure is applied by hardware and software makers, as well as ISPs that are doing the right thing.

How might we gain a more complete picture of which network providers aren’t blocking spoofed traffic — without relying solely on voluntary reporting? That would likely require a concerted effort by a coalition of major hardware makers, operating system manufacturers and cloud providers, including Amazon, Apple, Google, Microsoft and entities which maintain the major Web server products (Apache, Nginx, e.g.), as well as the major Linux and Unix operating systems.

The coalition could decide that they will unilaterally build such instrumentation into their products. At that point, it would become difficult for hosting providers or their myriad resellers to hide the fact that they’re allowing systems on their networks to be leveraged in large-scale DDoS attacks.

To address the threat from the mass-proliferation of hardware devices such as Internet routers, DVRs and IP cameras that ship with default-insecure settings, we probably need an industry security association, with published standards that all members adhere to and are audited against periodically.

The wholesalers and retailers of these devices might then be encouraged to shift their focus toward buying and promoting connected devices which have this industry security association seal of approval. Consumers also would need to be educated to look for that seal of approval. Something like Underwriters Laboratories (UL), but for the Internet, perhaps.

THE BLEAK VS. THE BRIGHT FUTURE

As much as I believe such efforts could help dramatically limit the firepower available to today’s attackers, I’m not holding my breath that such a coalition will materialize anytime soon. But it’s probably worth mentioning that there are several precedents for this type of cross-industry collaboration to fight global cyber threats.

In 2008, the United States Computer Emergency Readiness Team (CERT) announced that researcher Dan Kaminsky had discovered a fundamental flaw in DNS that could allow anyone to intercept and manipulate most Internet-based communications, including email and e-commerce applications. A diverse community of software and hardware makers came together to fix the vulnerability and to coordinate the disclosure and patching of the design flaw.

deathtoddosIn 2009, Microsoft heralded the formation of an industry group to collaboratively counter Conficker, a malware threat that infected tens of millions of Windows PCs and held the threat of allowing cybercriminals to amass a stupendous army of botted systems virtually overnight. A group of software and security firms, dubbed the Conficker Cabal, hashed out and executed a plan for corralling infected systems and halting the spread of Conficker.

In 2011, a diverse group of industry players and law enforcement organizations came together to eradicate the threat from the DNS Changer Trojan, a malware strain that infected millions of Microsoft Windows systems and enslaved them in a botnet that was used for large-scale cyber fraud schemes.

These examples provide useful templates for a solution to the DDoS problem going forward. What appears to be missing is any sense of urgency to address the DDoS threat on a coordinated, global scale.

That’s probably because at least for now, the criminals at the helm of these huge DDoS crime machines are content to use them to launch petty yet costly attacks against targets that suit their interests or whims.

For example, the massive 620 Gbps attack that hit my site this week was an apparent retaliation for a story I wrote exposing two Israeli men who were arrested shortly after that story ran for allegedly operating vDOS — until recently the most popular DDoS-for-hire network. The traffic hurled at my site in that massive attack included the text string “freeapplej4ck,” a reference to the hacker nickname used by one of vDOS’s alleged co-founders.

Most of the time, ne’er-do-wells like Applej4ck and others are content to use their huge DDoS armies to attack gaming sites and services. But the crooks maintaining these large crime machines haven’t just been targeting gaming sites. OVH, a major Web hosting provider based in France, said in a post on Twitter this week that it was recently the victim of an even more massive attack than hit my site. According to a Tweet from OVH founder Octave Klaba, that attack was launched by a botnet consisting of more than 145,000 compromised IP cameras and DVRs.

I don’t know what it will take to wake the larger Internet community out of its slumber to address this growing threat to free speech and ecommerce. My guess is it will take an attack that endangers human lives, shuts down critical national infrastructure systems, or disrupts national elections.

But what we’re allowing by our inaction is for individual actors to build the instrumentality of tyranny. And to be clear, these weapons can be wielded by anyone — with any motivation — who’s willing to expend a modicum of time and effort to learn the most basic principles of its operation.

The sad truth these days is that it’s a lot easier to censor the digital media on the Internet than it is to censor printed books and newspapers in the physical world. On the Internet, anyone with an axe to grind and the willingness to learn a bit about the technology can become an instant, self-appointed global censor.

I sincerely hope we can address this problem before it’s too late. And I’m deeply grateful for the overwhelming outpouring of support and solidarity that I’ve seen and heard from so many readers over the past few days. Thank you.

Read the whole story
antong
2761 days ago
reply
Google stronger than Akamai or reasonabler than Akamai? In internet vs business.
Jakarta
dmierkin
2760 days ago
Google has more money
popular
2761 days ago
reply
Share this story
Delete

The ultimate Online Privacy Test Resource List

1 Comment

Whenever you connect with a program to an Internet resource, a web browser to a website for instance, information are revealed to the server hosting the resource. site.

That's automatic, and often not the only thing happening. If that site loads resources from other servers, they too gain information, and depending on what is running on the site and supported by the browser, additional information may be revealed.

Usually, information such as your computer's IP address, a user agent that reveals browser, operating system and language, and a handful of other information are revealed automatically during connections.

While there are methods available to hide or block certain information from being made known to sites you connect to, there are also methods that sites can use to find out more about you.

Online Privacy Test Resource List

ip-address-leak

Online privacy tests help you find out what kind of information your browser (or other programs) reveal.  The information itself is useful, but you can also act upon it, for instance by disabling certain features in the program you are using if you don't require them. it.

You find two listings below. The basic tests listing contains resources that perform simple tests (usually one) only while the advanced tests listing resources that run a series of tests.

Basic Tests

Name What Link
Bad SSL Tests how the browser handles certain SSL certificates and other SSL-types https://badssl.com/
Battery Status API Tests the status of the battery http://pstadler.sh/battery.js/
BrowserRecon Fingerprinting test based on user agent http://www.computec.ch/projekte/browserrecon/?s=scan
Browser Referer HeadersBrowser referer headers test suite.https://www.darklaunch.com/tools/test-referer
Canvas Fingerprinting Checks whether Canvas can be used to fingerprint the browser https://www.browserleaks.com/canvas
Check my Torrent IPCheck which IP address is revealed to peers and trackers when you use torrent clients.https://torguard.net/checkmytorrentipaddress.php
Content Filters and Proxy Test Tests network filters, TOR browser and local content filters https://www.browserleaks.com/proxy
DNS Leak Test Tests whether your IP address is leaked by DNS https://www.dnsleaktest.com/
DNS Spoofability Test Comprehensive analysis of DNS resolving nameservers https://www.grc.com/dns/dns.htm
Email IP LeakFinds out whether your email provider leaks your IP addresshttp://emailipleak.com/
Do Not Track Detects support for Do Not Track https://www.browserleaks.com/donottrack
Email IP LeakFinds out whether your email provider leaks your IP addresshttp://emailipleak.com/
Email Privacy TesterTests whether your email client leaks back information to the sender of an emailhttps://emailprivacytester.com/
Email TraceRun reverse email look ups or email header traceshttp://www.ip-adress.com/trace_email/
Evercookie Test Checks if persistent data can be saved to the local user system. http://samy.pl/evercookie/
Firefox Addon Detector Checks if certain Firefox add-ons are installed https://thehackerblog.com/addon_scanner/
Flash Player System Test Lists information about Flash Player https://www.browserleaks.com/flash
Flash Player Test Checks whether Adobe Flash Player is installed https://www.adobe.com/software/flash/about/
FREAK Attack: Client CheckTests whether your browser is vulnerable to the Freak Attackhttps://freakattack.com/clienttest.html
Heartbleed testTests a server for the Heartbleed vulnerabilityhttps://filippo.io/Heartbleed/
How's My SSLChecks SSL support and provides a ratinghttps://www.howsmyssl.com/
HTML5 Features Detection Checks HTML5 capabilities https://www.browserleaks.com/modernizr
HTML5 Geolocation Test Tries to look up your location in the world https://www.browserleaks.com/geo
HTML5 Test Tests the browsers HTML5 capabilities http://html5test.com/
IP MagnetReveal which IP address BitTorrent clients reveal to peers and trackers.http://ipmagnet.services.cbcdn.com/
Java Test Tests whether Java is installed https://www.java.com/en/download/installed.jsp
JavaScript Browser Information Lots of information about the browser's JavaScript capabilities https://www.browserleaks.com/javascript
Mozilla Plugin Check Checks which plugins are installed in the Firefox web browser https://www.mozilla.org/en-US/plugincheck/
Popup Blocking TestsTests how well your browser handles (blocks) popupshttp://www.kephyr.com/popupkillertest/index.html
RC4 Fallback Test Runs a Fallback Vulnerability test https://rc4.io/
Redirect test pageRun a series of redirect tests to find out how your browser handles thosehttps://jigsaw.w3.org/HTTP/300/Overview.html
Silverlight Test Reveals information about Silverlight https://www.browserleaks.com/silverlight
SSL CheckReveals the SSL cipher used to connect to the websitehttps://www.fortify.net/sslcheck.html
SSL Cipher Suite DetailsLists all cipher suites supported by the browserhttps://cc.dcsec.uni-hannover.de/
System Fonts Detection Uses CSS+JS, Flash, Silverlight or Java to detect fonts https://www.browserleaks.com/fonts
The Joys of HTML Tests whether sites can fill your hard drive with data http://www.filldisk.com/
Universal Plug n'Play (UPnP) Internet Exposure Test Tests whether your computer rejects UPnP probes https://www.grc.com/x/ne.dll?rh1dkyd2
WebRTC Leak Test Tests whether local or public IP addresses are leaked https://www.perfect-privacy.com/webrtc-leaktest/
http://whatismyipaddress.com/webrtc-test
WebRTC Test Tests WebRTC capabilities https://test.webrtc.org/
Whois Test Reveals IP address, host name, IP address location information and other IP related information https://www.browserleaks.com/whois
Weak Diffie-Hellman and the Logjam AttackTests whether your browser is vulnerable to the Logjam attackhttps://weakdh.org/

Advanced Tests

IP Lookup
Name What Link
Am I Unique Tests whether the browser is unique by checking the following information: User-agent, Accept, Content Encoding, Content Language, List of Plugins, Platform, Cookies, Do Not Track, Timezone, Screen Resolution, Use of local storage, Use of session storage, Canvas, WebGL, Fonts, Screen resolution, Language, Platform, Use of Adblock https://amiunique.org/fp
Browser Spy Runs the following individual tests: Accepted Filetypes, ActiveX, Adobe Reader, Ajax Support, Bandwidth, Browser, Capabilities, Colors, Components, Connections, Cookies, CPU, CSS, CSS Exploit, Cursors, Date and Time, DirectX, Document, Do Not Track, .Net Framework, Email Verification, Flash, Fonts via Flash, Fonts via Java, Gears, Gecko, Geolocation, Google Chrome, Google Apps, GZip Support, HTTP Headers, HTTP, Images, IP Address, Java, JavaScript, Languages, Mathematical, MathML Support, MIME Types, Mobile, Network, Objects, Object Browser, Online/Offline, OpenDNS, OpenOffice.org, Opera Browser, Opreating System, Google PageRank, Ping, Plugins, Plugs, Prefetech, Proxy, Proxy, Personal Security Manager, QuickTime Player, RealPlayer, Resolution, Screen, Security, Shockwave, Silverlight, Sound Card, SVG, Text Formatting, File Upload, User/Agent, VBScript, WAP Device, WebKit, Web Server, Window, Windows Media Player http://browserspy.dk/
Cross Browser Fingerprinting Test Tests locality, operating system, screen resolution, time zone, User Agent string, HTTP Accept, Plugins, Fonts http://fingerprint.pet-portal.eu/#
IP
LeakRuns the following tests: IP address, location, WebRTC IP detection, Torrent address detection, Geolocation detection, IP details, Geek details (user agent, referer, language, content encoding, document, system information, screen information, plugins, HTTP Request headershttps://ipleak.net/
Checks IP address, browser user agent, referer http://www.ghacks.net/ip/
Five Star Privacy CheckerChecks IP address, location, ISP, DNs, Blacklisted or Proxy use, IP location, Script usage such as ActiveX, JavaScript, Java and Flash.http://5who.net/
Jondonym Full Anonymity Test Tests IP, location, net provider, Reverse DNS, Cookies, Authentication, Cache (E-Tags), HTTP Session, Referer, Signature, User-Agent, SSL Session ID, Language, Content Types, Encoding, Do Not Track, Upgrade-Insecure-Requests http://ip-check.info/?lang=en
Panopticlick Tests Supercookies, Canvas Fingerprinting, Screen size and color depth, browser plugins, time zone, DNT header, HTTP Accept headers, WebGL fingerprinting, language, system fonts, platform, user agent, touch support and cookies https://panopticlick.eff.org/
PC FlankA whole battery of tests including: Stealth Test, Browser Test, Trojans Test, Advanced Port Scanner, Exploits Test, PC Flank Leaktesthttp://www.pcflank.com/index.htm
Onion Leak Test For CORS and WebSocket Requests http://cure53.de/leak/onion.php
WhoerComprehensive test suite that tests for IP address, location, ISP, OS, Browser, Anonymity settings such as DNS, Proxy, Tor, Anonymizer or Blacklist, Browser headers, whether JavaScript, Flash, Java, ActiveX or WebRTC are enabled, time zone, language settings, screen information, plugins, navigator information and HTTP headershttps://whoer.net/

Now You: Please help make this the best privacy test resource online by sharing resources not on this list already.

Ghacks needs you. You can find out how to support us here or support the site directly by becoming a Patreon. Thank you for being a Ghacks reader.

The post The ultimate Online Privacy Test Resource List appeared first on gHacks Technology News.

Read the whole story
antong
3032 days ago
reply
https://browsercheck.qualys.com/?scan_type=js
Jakarta
Share this story
Delete
Next Page of Stories