Story image

Anti-tracking browser extension Ghostery goes open source

13 Mar 18

Ghostery, a provider of free software that makes your web browsing experience cleaner and safer by detecting and blocking third-party data-tracking technologies, announced that it is going open source and the code for its popular browser extension is now publicly available on GitHub.

This move demonstrates Ghostery’s commitment to transparency, empowering the public to see how Ghostery works and what types of data it collects, as well as the ability to make contributions to its source code.

“When it comes to putting users in control of their data, privacy and transparency are equally important,” says Ghostery product director Jeremy Tillman.

“Only when individuals clearly understand what data digital products are collecting they can make meaningful decisions about what information they share and with whom.”

“Our software lets users see who tracks them and provides transparency into the impenetrable and secretive world of commercial online surveillance. In an effort to be as open as possible with our own users, we are following the example of our parent company, Cliqz, to publish Ghostery’s source code and make it freely available to the world,” Tillman says.

“Beyond increasing our own transparency, becoming an open source product creates a tremendous opportunity for our user community to contribute to our code and join us in our effort to make the internet cleaner, faster, and safer.”

Ghostery has a very passionate and active user community.

Most users already voluntarily contribute to statistics that are used by Ghostery and its parent company Cliqz to discover new trackers and unveil the invisible tracking ecosystem that pervades the web to assess the relevance and safety of websites.

The technical basis for this data contribution is the Human Web, an open source data architecture built by Cliqz that uses anonymisation and encryption technologies to prevent interception and to ensure these statistics contain no data about individual users, ensuring total privacy and transparency.

Ghostery is a first browser extension that makes your web browsing experience faster, cleaner and safer by detecting and blocking thousands of third-party data-tracking technologies – putting control of their own data back into consumers’ hands.

Launched in 2009, Ghostery has more than seven million monthly active users who access the tool via app or browser extension.

With its intuitive user interface, Ghostery enables average internet users to protect their privacy by default, while expert users benefit from a broad set of features and settings.

Headquartered in New York, the Ghostery apps and browser extensions are developed and operated by Ghostery, Inc., a fully-owned subsidiary of Cliqz GmbH.

Cliqz is a German search, browser, and data protection technology company backed by Mozilla and Hubert Burda Media.

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.