Opera-developer: Identifying backend connections
tharrisone last edited by
I've always had reservations using Chrome/Chromium because of all the Google remote connections and WebRequest API crud beyond most users knowledge.
After looking at all net activity I've only been able to identify a few opera services.
The sitecheck host is a malware domain checker that uses http instead of https but it has no option to disable.
The others are understandable if you want updates or to install/update an extension.
It's great to have a webkit/blink opera browser(especially for me in Linux) that isn't heavily leaking out my personal data. I'll keep monitoring tcp/udp connections just in case but I've already made the opera-developer version my default browser.
indonesian last edited by
This one should gives you all the goodies you ever need.
HTTP Switchboard (FOSS) put you in FULL control of where your browser is allowed to connect, what type of data it is allowed to download, and what it is allowed to execute. Nobody else decides for you: You choose. You are in full control of your privacy.
- See ALL the remote connections, failed or attempted, depending on whether they were blocked or allowed (you decide).
- A single-click to whitelist/blacklist one or multiple classes of requests according to the destination and type of data (a blocked request will NEVER leave your browser).
- You do not have to solely rely on just one particular curated blacklist (arguably with many missing entries) outside which nothing else can be blocked.
- Ease of use: HTTP Switchboard lets you easily whitelist/blacklist net requests which originate from within a web page according to a point-and-click matrix:
- domain names (left column)
from very specific
to very generic
- type of requests (top row)
stylesheets (and web fonts)
XHR (requests made by scripts)