• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • April 15th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Surveillance

Windows Users Data on Display as Microsoft Drops it’s “Do Not Track” Policy

April 6th, 2015 Waqas Privacy, Security, Surveillance 0 comments
Windows Users Data on Display as Microsoft Drops it’s “Do Not Track” Policy
Share on FacebookShare on Twitter

On Friday, Microsoft revised its approach to “Do Not Track” for all upcoming and future versions of its browsers. The company confirmed that it will “no longer enable Do Not Track feature in its web browser by default.”

The DNT used to be a default option in Microsoft Internet Explorer since 2012 – meaning that it would automatically be assumed that web users did not want their data to be seen by third parties.

However, this has now changed, with Microsoft saying that the latest industry standards are forcing the company to do so.

  • Read More: C-93 Virus Alert Email from Microsoft is a Phishing Scam

windows-users-data-on-display-as-microsoft-drops-its-do-not-track-policy

“In the absence of user choice, there is no tracking preference expressed,” Microsoft cited the latest World Wide Web Consortium (W3C) draft for the feature as saying. At the same time it says the setting“must” reflect users preference.

According to sources from Microsoft, the firm wants to “eliminate any misunderstanding about whether our chosen implementation will comply with the W3C standard [therefore] Do Not Track will not be the default state in Windows Express Settings moving forward.” 

However, Microsoft still maintains that it will continue to “provide customers with clear information on how to turn this feature on in the browser settings should they wish to do so.”

  • Read More: Hacked Emails Show How Much Microsoft Charges FBI for Selling Your Personal Data

Trust = Privacy x Value x Security #MicrosoftIoT via @MicrosoftIPC http://t.co/Py1UEHnG3y

— Horacio Gutierrez (@horaciog) April 3, 2015

The new alterations will be applicable for those who have bought or will buy a new Windows PC and/or if they are planning to upgrade the version of Internet Explorer or MS Windows.

How to turn Tracking Protection on or off in the desktop manually: 

Open the desktop, and then tap or click the Internet Explorer icon on the taskbar. Tap or click the Tools button , point to Safety, and then do one of the following: Tap or click Turn onTracking Protection. Tap or click Turn off Tracking Protection. 

Read more about these changes on Microsoft’s official blog.

Follow @HackRead

  • Tags
  • Data
  • Internet Explorer
  • Microsoft
  • Privacy
  • security
  • Windows
Facebook Twitter LinkedIn Pinterest
Previous article DARPA Testing Submarine Drone That Survives Under Ocean for Years
Next article Mobilize to socialize: Facebook Integrates WhatsApp into 'Facebook for Android'
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Unpatched MS Exchange servers hit by cryptojacking malware

Unpatched MS Exchange servers hit by cryptojacking malware

Indian supply-chain giant Bizongo exposed 643GB of sensitive data

Indian supply-chain giant Bizongo exposed 643GB of sensitive data

FBI accessing computers across US to remove malicious web shells

FBI accessing computers across US to remove malicious web shells

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Unpatched MS Exchange servers hit by cryptojacking malware
Security

Unpatched MS Exchange servers hit by cryptojacking malware

Indian supply-chain giant Bizongo exposed 643GB of sensitive data
Leaks

Indian supply-chain giant Bizongo exposed 643GB of sensitive data

FBI accessing computers across US to remove malicious web shells
Security

FBI accessing computers across US to remove malicious web shells

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us