- cross-posted to:
- technology@lemmy.world
- cross-posted to:
- technology@lemmy.world
From my understanding of their implementation, you have to give a Mozilla server all of your traffic history, and then they feed a curated, sanitize topic list of that activity to the advertisers.
So now we’re trusting Mozilla with your full browsing history, that seems like a really bad idea. Even if I love and trust Mozilla, I don’t want to add yet another thing to the critical path
If you have syncing on, you are already trusting Mozilla with your history.
deleted by creator
All your data is encrypted on our servers so we can’t read it – only you can access it. We don’t sell your info to advertisers because that would go against our data privacy promise.
You are correct. My mistake.
Oh yeah, agreed, if your syncing then your security model doesn’t include worrying about tracking.
PPA does not involve sending information about your browsing activities to anyone. This includes Mozilla and our DAP partner (ISRG). Advertisers only receive aggregate information that answers basic questions about the effectiveness of their advertising.
https://datatracker.ietf.org/doc/html/draft-ietf-ppm-dap#name-security-considerations
The explicitly say if the aggregator is controlled by hostile party, and in my scenario that would be Mozilla, they could have full access to the deanonymized data. It’s out of scope for their protocol.
And while the DAP draft is nice, it doesn’t change my threat model, it just introduces extra steps. As the absolute hunger of AI inputs for models have shown us, if a company has the capability to get data, they will. Mozilla has demonstrated they are hungry for data and money. I don’t want to give them the capability
How are they different from any other VPN service or even uBlock? They all have access to your browsing info and can potentially use it for profit.
You think I don’t know how a VPN works?
I think you misunderstood what I meant.