-
-
Notifications
You must be signed in to change notification settings - Fork 379
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Understanding the user data json file #2716
Comments
Hello! I just updated our design document to explain As for Let me know if you have any questions. |
Hi! Thank you for the update! I had a quick question, is the info stored in the snitch_map based on the user's activity? It seems to store data about websites that I have never visited. For example, the domain value that occurs the most is informationweek.com, a website I haven't visited. |
Privacy Badger includes pre-trained tracker data gathered by Badger Sett. If you enable learning to block trackers from your browsing in options, your Privacy Badger will then build on that pre-trained data as you browse the Web. You can clear the pre-trained data under the Manage Data tab on the options page. |
By the way, there are a few problems with using a stock Privacy Badger to answer questions like which websites have the most trackers. For example, trackers often load other trackers dynamically. When a tracker that brings in other trackers is blocked, Privacy Badger never sees the trackers that would have been loaded otherwise. Moreover, So if you want to use Privacy Badger to figure out which sites have the most trackers, which trackers appear on the most sites, etc., you should use a modified Privacy Badger, one that doesn't block requests (nor modify them in any way?), and one that doesn't cap |
That is really helpful, thank you! I have been looking at the code to figure out how to remove the three sites cap on snitch_map entries, but couldn't really find how to do that. Do you have any suggestions? |
I think your best bet is to set Don't forget to enable local learning (under General Settings > Advanced) and clear all pre-trained data (under the Manage Data tab). You may also want to disable sending "Global Privacy Control" and "Do Not Track" signals (under General Setttings), as some websites do respect them and serve fewer or no trackers in response. |
Gotcha! Thank you so much. From there, the process to install this modified version should just be to create an xpi file using the manifest.json? (I have no experience with extensions haha) |
Hey! So it seems like raising the threshold doesn't actually do anything. PB still blocks trackers after 3 spots. I commented out the code from line 331-335 in heuristicblocking.js and nothing changed. Do you have any more pointers? |
Did you update |
I did. I am using Chrome, and I load the src everytime I change something. I can try Firefox to see if that is any different. |
The browser shouldn't make a difference. I think there is something off with your workflow. Did you clear the pre-trained data, for example? If you're still having trouble, post the exact steps you followed and we could go from there. For example:
|
This is probably the silliest mistake I have made. I had a packed release of PB installed on Chrome, which was overriding the unpacked one I installed. It works as intended now. Thank you, and sorry for the confusion!! |
Hello!
I am a student working with privacy badger user downloadable data for a project. I needed to understand what the json file represents and couldn't find any information online. Could someone explain what action_map, settings_map, and snitch_map store?
The text was updated successfully, but these errors were encountered: