How to block online trackers

Anytime you visit a website, thousands of organizations are trying to observe your browsing history (unless it doesn’t allow trackers). The profiles these organizations create using that information can be surprisingly thorough. Many people do not even know they are being tracked, and those who do seem to accept that constant surveillance is the price you pay to be online. While the data these organizations collect are generally used to sell more targeted ads, having that information out of your control is a security risk and a privacy violation. No one should give up their right to privacy so easily.

Here we will discuss some of the tools and techniques you can use to block websites from tracking you, but before we begin, it is helpful to know how these services actually follow you.

How cookies track you on the internet

Cookies are tiny bits of text that websites place on your device based on the websites you visit and the things you click on. This text can then be read when you return to the site, letting it “recognize” you and re-create your previously chosen preferences. These are what allow you to remain logged in to a site unless you deliberately log out. These types of cookies are called first-party cookies, since they come directly from the website you are accessing.

Third-party cookies are placed on your device by third-parties — not by you, not by the website you are visiting, but by secret advertising services. These advertising services then follow your device from site to site, trying to see what websites and topics interest you to improve the ads they show you. They can also end up with a thorough record of your online activity.

Generally speaking, first-party cookies are useful, while third-party cookies raise numerous privacy concerns. Fortunately, third-party cookies are easy to isolate. Most of the following solutions will focus on how to avoid or block third-party cookies.

Eight ways to block online tracking

1. Use browser add-ons
One of the simplest things you can do to block third-party cookies is download an anti-tracking browser extension. The Electronic Frontier Foundation’s Privacy Badger(new window) uses algorithms to learn which third-party requests to block while Disconnect(new window) uses user-generated lists. Ghostery(new window) allows users to choose whether or not to grant permission to third-party trackers. All three of these browser add-ons are available for Chrome and Firefox.

For those looking for more robust and sophisticated ad-blocking tools, we suggest either AdBlock Plus(new window) or uBlock Origin(new window). These plugins require a bit more user knowledge as they block third-party scripts and apps. This protects your data but can also leave the webpage you are visiting unreadable until you figure out which scripts need to be run.

2. Block third-party cookies
Once a third party has tagged you with its cookies, it can track you for months unless you regularly clean your device. Chrome(new window), Firefox(new window), Opera(new window), and Microsoft Edge(new window) all have options that let you clean out third-party cookies. These browsers also have options that help limit the ability of third parties to give your device cookies, although they are generally less effective than the browser extensions listed above.

3. Use search engines that don’t track you
Search engines are the highways of the internet. They take us directly to the content we want. However, they often record and sell your search history, which for many people is the same as selling their browsing history. Search engines such as DuckDuckGo(new window) or Qwant(new window) do not track your IP address or log your search history, letting you access information with privacy.

4. Adjust your privacy settings
Facebook and Google both have numerous ways to track and collect your data. This is the foundation of their business, so the privacy you achieve on these platforms will be relative. However, users do have some control over what data these organizations can and cannot collect. By setting your Facebook profile to private and by visiting Facebook’s ad preferences page(new window), you can limit the amount of your information that the social network can collect and share.

Google gives its users control of what data it collects on their Account page(new window). Users can decide how Google targets them with personalized ads and delete records of their search history. While using different search engines will help, remember that Google can also access your data via Android devices, YouTube, and Gmail.

5. Use email services that don’t track you
Protecting your online activity means nothing if you do not secure your emails. While most tech companies have stopped scanning private emails for advertising data, recent news stories(new window) have shown the practice still exists. The best option to keep your emails secure and private are end-to-end encrypted services such as Proton Mail(new window).

6. Test for trackers
A quick way to evaluate the progress you’ve made in blocking third-party trackers is to visit the EFF’s Panopticlick(new window) or Am I Unique(new window). These sites will show you the trackers that still have access to your online activity and help you see your device’s “fingerprint.”

7. Use fingerprint defense
Fingerprinting is a new practice in which websites access your device’s graphics chip via JavaScript and the Canvas API. This can let websites know your language preference, time zone, what website you are going to, and what website you are coming from. The third party then gets the device to generate a unique image that can be used to identify and track the device. Since this image is not stored with your cookies, fingerprinting is hard to escape. The best defense is a browser extension like Canvas Defender(new window), which adds noise to the image third parties force your device to draw, helping to obfuscate your identity.

8. Use a VPN or Tor
To avoid being tracked by your device’s IP address, you can use a VPN(new window). This will route your internet traffic through a VPN server of your choosing and replaces your IP address with the IP address of that VPN server. Be sure to only use trustworthy VPN services because the company you choose can access and record your online activity while you are connected to their infrastructure. Alternatively, if speed and performance are not major considerations, you can also use the Tor anonymity network(new window), which encrypts your traffic while simultaneously routing it through multiple servers around the world.

Final Thoughts

There is no such thing as absolute privacy on the internet, but you can take positive steps to limit your exposure. As there are many ways to track you online, for maximum protection, you should use a combination of the methods outlined above. However, even if you only use a couple of these tools, it will dramatically limit the amount of information online trackers can collect from you and help you take back control of your personal data.

Best Regards,
The Proton VPN Team

You can follow us on social media to stay up to date on the latest Proton VPN releases:

Twitter (new window)Facebook(new window) | Reddit(new window)

To get a free Proton Mail encrypted email account, visit: proton.me/mail(new window)

Related articles

Where to watch Macy's Thanksgiving day parade
en
Here's how and where to watch Macy's Thanksgiving Day Parade live from anywhere in the world with Proton VPN.
What we've been up to, and what's next
en
Here are the main things Proton VPN delivered this spring and summer and the exciting changes that lie ahead on our product roadmap this winter.
Proton VPN for Windows ARM
en
  • Proton VPN news
We’re pleased to announce a new Proton VPN app with native support for Windows devices that use the ARM chipset.
What is doxing and is doxing illegal
en
We look at what doxing is, who does it (and why), and at how to protect yourself from doxing .
Stream securely on tvOS with Proton VPN
en
With the Proton VPN Apple TV app, you can easily and securely watch your favorite content on your big-screen TV no matter where you are.
Illustrated laptop devices representing a network with a shield and a lock in the center of the screen
en
Cybercriminals will take any opportunity to gain unauthorized access to your servers. Learn how you can stop them.