
Leakuidator+ wót Leakuidator+ Team
Protect your identity on the web Leakuidator+ helps users to protect themselves against cross-site leaks, a class of vulnerabilities derived from side-channels built into the web platform.
Trjebaśo Firefox, aby toś to rozšyrjenje wužywał
Metadaty rozšyrjenja
Wó toś tom rozšyrjenju
Protect your identity on the web
Leakuidator+ helps users to protect themselves against cross-site leaks, a class of vulnerabilities derived from side-channels built into the web platform.
When browsing the web, Leakuidator+ keeps users safe against deanonymization attacks by protecting their online identities associated with storage sites such as Google Drive, One Drive, and Dropbox; media sharing sites such as YouTube, Google Photos, Amazon Photos, and Flickr; code-hosting repositories such as GitHub, GitLab, Bitbucket, and Assembla; social media sites such as Facebook, Twitter, and Instagram, and other websites.
Leakuidator+ has two modes of operation, Relaxed and Exact, which reflect the criteria used for identifying potentially dangerous requests made by a website. For each dangerous request identified, the user has the option to let the request pass through or to continue being protected. Prior user decisions can be recorded for future use, and are accessible for editing through the options page.
Leakuidator+ helps users to protect themselves against cross-site leaks, a class of vulnerabilities derived from side-channels built into the web platform.
When browsing the web, Leakuidator+ keeps users safe against deanonymization attacks by protecting their online identities associated with storage sites such as Google Drive, One Drive, and Dropbox; media sharing sites such as YouTube, Google Photos, Amazon Photos, and Flickr; code-hosting repositories such as GitHub, GitLab, Bitbucket, and Assembla; social media sites such as Facebook, Twitter, and Instagram, and other websites.
Leakuidator+ has two modes of operation, Relaxed and Exact, which reflect the criteria used for identifying potentially dangerous requests made by a website. For each dangerous request identified, the user has the option to let the request pass through or to continue being protected. Prior user decisions can be recorded for future use, and are accessible for editing through the options page.
Z 2 wót 3 pógódnośujucych pógódnośony
Pšawa a datyDalšne informacije
Trjebne pšawa:
- Pśistup k rejtarikam wobglědowaka měś
- Pśistup k aktiwiśe wobglědowaka za nawigaciju měś
- Pśistup k wašym datam za wšykne websedła měś
Dalšne informacije
- Dodankowe wótzkaze
- Wersija
- 0.0.0.6
- Wjelikosć
- 274,23 KB
- Slědny raz zaktualizěrowany
- há 3 anos (19 de jun de 2022)
- Pśiswójźbne kategorije
- Licenca
- Licenca Mozilla Public License 2.0
- Wersijowa historija
- Zběrce pśidaś
Wersijowe informacije za 0.0.0.6
- cleaning the source code
- listing the third party libraries used
- listing the third party libraries used
Wěcej rozšyrjenjow wót Leakuidator+ Team
- Hyšći pógódnośenja njejsu
- Hyšći pógódnośenja njejsu
- Hyšći pógódnośenja njejsu
- Hyšći pógódnośenja njejsu
- Hyšći pógódnośenja njejsu
- Hyšći pógódnośenja njejsu