News:

Willkommen im Notebookcheck.com Forum! Hier können sie über alle unsere Artikel und allgemein über Notebook relevante Dinge disuktieren. Viel Spass!

Main Menu

Free yourself from YouTube tracking, is it worth it (or practical) to host your own YouTube front end

Started by Redaktion, October 05, 2024, 12:03:15

Previous topic - Next topic

Redaktion

Google is notorious for tracking people across websites, and this extends to almost every service it offers, including Android and YouTube. If you are on a quest to escape Google's aggressive data practices, you might want to consider hosting your own YouTube front end. But how easy is it, and is it worth it?

https://www.notebookcheck.net/Free-yourself-from-YouTube-tracking-is-it-worth-it-or-practical-to-host-your-own-YouTube-front-end.897819.0.html

Gallo123

It should be mentioned that people often share URLs for Youtube tracking strings in them. So even if you use clean front ends Google can still track you from your peers.

Raviel47

Quote from: Gallo123 on October 05, 2024, 12:34:13It should be mentioned that people often share URLs for Youtube tracking strings in them. So even if you use clean front ends Google can still track you from your peers.

Don't these usually clear the tracking strings at the end of whatever link you put in? And even if they don't to my admittedly limited knowledge a lot of what YT gets back(to track you) depends on the client you use in the first place and these should all send back almost nothing regardless. I'm open to being corrected though :)

N-B

By the way, it is a well-known fact - in the Tor browser based on Firefox, Google, despite changing the exit node (or the entire chain of 3 nodes) and deleting cookies with all other site information (leave the YouTube site, delete everything, change the chain of nodes), still determines in some cases that the new IP with a new exit point is used by the same client and blocks access - even a hundred changes of exit points/chain and preliminary deletion of cookies and other information available through the browser form do not help. Only exiting the Tor browser and loading it again helps, despite the fact that the form for deleting cookies and other site information, together with changing entry-exit points, should in theory do the same. Let's move on. In countries with censorship, it quickly became clear that the "protection" of browsers based on encrypted DNS, i.e. access to sites via services like cloudfare does NOT work in fact, the censorship system still determines the presence of the required site address, despite the supposedly fully encrypted traffic even at the level of supposedly DNS requests - although encrypted site traffic + encrypted DNS (otherwise what's the point?) in fact should be a complete analogue of a VPN tunnel, when neither the provider nor the censorship systems know where and how the traffic goes.

The world is not at all what corporations with their supposed "user security" policy present to us. Everything is exactly the opposite regarding the fact that they lie to people.

NikoB.

Quick Reply

Name:
Email:
Verification:
Please leave this box empty:

Shortcuts: ALT+S post or ALT+P preview