Jonathan Mayer writes:
Over the past couple of days, there’s been an outpouring of concern about Verizon’s advertising practices. Verizon Wireless is injecting a unique identifier into web requests, as data transits the network. On my phone, for example, here’s the extra HTTP header.1
X-UIDH: OTgxNTk2NDk0ADJVquRu5NS5+rSbBANlrp+13QL7CXLGsFHpMi4LsUHw
After poring over Verizon’s related patents and marketing materials, here’s my rough understanding of how the header works.
Read more on Web Policy.
Update: See also this article by Robert Lemos on Ars Technica: Verizon Wireless injects identifiers that link its users to Web requests
Well as usual no one in government is doing the joib we pay them to do but instead are taking bribes from the big corporations.
Seem to me that the answer to this is to add you own fake X-UIDH Header to HTTP requests being sent out and then lets see if they stop using every dirsty trick in the book to track us.
Yes i also sharre Google cookies, Google needs to be stopped too and uses 5000 lines of javascript just to a a Google Plus button to a page and the rest of the code is used to steel any details about you browser and OS that are then up loaded back to Google.
Togeather we can beat them.