peacepink

Worldwide Campaign to stop the Abuse and Torture of Mind Control/DEWs

The creepy website that tracks your every move: ClickClickClick reveals how much browsers know about you

The creepy website that tracks your every move: ClickClickClick reveals how much browsers know about you

  • ClickClickClick details actions in real-time, both in writing and vocally
  • For example, if you move the mouse, it will write 'subject has moved right'
  • The unnerving tool does not do any damage to your computer, but is a reminder to be wary about who is watching you on the web

While you might think that clearing your browsing history is enough to keep your activity private, a new website could make you think again.

A creepy website called ClickClickClick has been developed to show how your online behaviour is constantly being measured by your browser.

The website details your actions in real-time, from your movements on the page, to the other websites you have visited, in the hope of creating awareness on privacy in a playful manner.

A creepy website called clickclickclick has been developed to show how your online behaviour is constantly being measured by your computer. The website details your actions in real-time showing just how much your browser knows about your behaviour online

A creepy website called clickclickclick has been developed to show how your online behaviour is constantly being measured by your computer. The website details your actions in real-time showing just how much your browser knows about your behaviour online

HOW DOES IT WORK? 

The website – which does not cause damage to your computer - is very simple, with a white screen and large green button, reading 'Button.'

But from the second you visit the page, it starts detailing your actions in real-time.

For example, the website will write 'Subject has visited seven websites before coming here' or 'Subject has clicked the button five times.'

As well as typing out what you're doing in real time, the site also encourages users to turn on their sound, allowing them to hear an English voice comment on every behaviour.

After a few minutes of this, the website will give users the option of seeing their 'achievements' – a list of all the activities it has tracked so far, and those that it is yet to observe.

Clickclickclick.click was developed by VPRO, a Dutch media company, and Studio Moniker, an interactive design company.

Roel Wouters, a designer at Studio Moniker, told MailOnline: 'We wanted to create awareness on privacy in a playful manner.

'We took the idea that all your online behaviour can have value literally.

'We listed all possible interactions we could come up with. We interpret these interactions in a direct and specific way by mirroring them back to the user.'

The website – which does not cause damage to your computer - is simple, with a white screen and large green button, reading 'Button.'

But from the second you visit the page, it starts detailing your actions in real-time.

For example, the website will write 'Subject has visited seven websites before coming here' or 'Subject has clicked the button five times.'

As well as typing out what you're doing in real time, the site also encourages users to turn on their sound, allowing them to hear an English voice comment on every behaviour.

After a few minutes of this, the website will give users the option of seeing their 'achievements' – a list of all the activities it has tracked so far, and those that it is yet to, but capable of, observing.

The technology used to create the site isn't anything revolutionary, and could be used by any web developer.

The simple tool does not do any damage to your computer, but is a reminder to be wary about who is watching you on the web (stock image) 

The simple tool does not do any damage to your computer, but is a reminder to be wary about who is watching you on the web (stock image) 

Mr Wouters said: 'All these interactions are basic HTML 5 browser events – basically it's all javascript.

'They are in the hands of every web developer today.'

The simple tool does not do any damage to your computer, but is a reminder to be wary about who is watching you on the web. 

FIVE STEPS TO MORE SECURE ONLINE OPERATIONS 

Even using this checklist can't guarantee stopping every attack or preventing every breach. But following these steps will make it significantly harder for hackers to succeed. 

And it will help us all develop security consciousness and ultimately better cyberhygiene.

1) Enable two-factor authentication (2FA). Most major online services, from Amazon to Apple, today support 2FA. 

When it's set up, the system asks for a login and password just like usual – but then sends a unique numeric code to another device, using text message, email or a specialized app. 

Without access to that other device, the login is refused. That makes it much harder to hack into someone's account – but users have to enable it themselves.

2) Encrypt your internet traffic. A virtual private network (VPN) service encrypts digital communications, making it hard for hackers to intercept them. 

Everyone should subscribe to a VPN service, some of which are free, and use it whenever connecting a device to a public or unknown Wi-Fi network.

3) Tighten up your password security. This is easier than it sounds, and the danger is real: Hackers often steal a login and password from one site and try to use it on others. 

To make it simple to generate – and remember – long, strong and unique passwords, subscribe to a reputable password manager that suggests strong passwords and stores them in an encrypted file on your own computer.

4) Monitor your devices' behind-the-scenes activities. Many computer programs and mobile apps keep running even when they are not actively in use. 

Most computers, phones and tablets have a built-in activity monitor that lets users see the device's memory use and network traffic in real time. 

You can see which apps are sending and receiving internet data, for example. If you see something happening that shouldn't be, the activity monitor will also let you close the offending program completely.

5) Never open hyperlinks or attachments in any emails that are suspicious. 

Even when they appear to come from a friend or coworker, use extreme caution – their email address might have been compromised by someone trying to attack you. 

When in doubt, call the person or company directly to check first – and do so using an official number, never the phone number listed in the email. 

- Arun Vishwanath, Associate Professor of Communication, University at Buffalo, State University of New York

 

Views: 37

Comments are closed for this blog post

Latest Activity

brian bovo commented on Angeline Klas's blog post Demon like people!
"They get to through a method ive partially discovered.  If you go around with a gauss meter.  You may find odd places have high gauss.  They come out from you and find places to reflect sounds back."
2 hours ago
Angeline Klas posted a blog post

Demon like people!

Don't you think it's about time the Perps suffer for what they are doing? Somehow Ti's don't want to Unite. I think it's strange! The Pers are everywhere, They are just like Rats. The perps mock me because The neighbourhood harasses me. They say "there is no place like home". They have infiltrated my work.They play the App during my work, you can hear it as I sit in the office. They were hoping it would be hart breaking for me. The Perp told me to cry at that moment. I wrote everything down in…See More
2 hours ago
Angeline Klas commented on CLS's status
"How do you stop the Rape?!? They have been it to me for over 2 years now. How can I stop them? Well Bye bye for now, Angeline Klas"
3 hours ago
brian bovo replied to Anthony Benjamin's discussion UNWITTING VICTIMS TARGETED INDIVIDUALS = TI SUPPORT SITE
"Also imagine sphere mirrors all over inside you"
3 hours ago
brian bovo replied to Anthony Benjamin's discussion UNWITTING VICTIMS TARGETED INDIVIDUALS = TI SUPPORT SITE
"You can shrink pain fields as the method can be pushed by mind force to feet.  Just try hard to be kinetic on your body and imagine it moving down through body to feet"
3 hours ago
brian bovo replied to Anthony Benjamin's discussion UNWITTING VICTIMS TARGETED INDIVIDUALS = TI SUPPORT SITE
"Ive had most all that.  Discovered the genital manipulation is point to point connections from anus to genital.  For males the flake embeds or w/e it is just inside the eurethra"
3 hours ago
Angeline Klas commented on CLS's status
"How do you stop the Rape?!? Bye bye for now, Angeline Klas"
3 hours ago
Anthony Benjamin posted a discussion

UNWITTING VICTIMS TARGETED INDIVIDUALS = TI SUPPORT SITE

UNWITTING VICTIMS TARGETED INDIVIDUALS = TI SUPPORT SITEWe have included 'full symptoms list' from surveys of the targeted individual community, with a link at the bottom of the page to the survey page itself from FFCHS.Males’ scrotum pulled up like a piece of elastic:Females’ you should have feeling around the full circumference of both the inner and outer flaps covering the female genitals, medical…See More
4 hours ago

Badge

Loading…

© 2018   Created by Soleilmavis.   Powered by

Badges  |  Report an Issue  |  Terms of Service