Nowadays super-cookies are tracking the websites visited by phones on its networks. It is almost impossible to browse the internet on 3G/4G data connections because of their super-cookie header injection which pumps in these frustrating popup ads on users’ mobile browsers.
Beware Smartphone Users: Super-Cookies Tracking Websites on Mobile Phones
Also Read: PTA to Block Porn Websites on Mobile Phones
Every other cellular data consumer in Pakistan emanates across these DNSLocker ads. These ads are not only bogus, but lead to a much bigger problem, a total compromise on users’ privacy.
Users’ privacy is bargained in exchange for cheap or almost free 3G packages. Telcos have been silently altering web traffic on its network to inoculate a tracker that is really hard to discard.
The super-cookie is included in an HTTP header identified as X-UIDH and is sent to every website you visit from your mobile device. As a result, third-party advocates working secretly with these telecom companies get to know about your complete browsing habit.
Basically users are letting telecom carriers or government takeover their browser. They summon them to fit forged browser certificates and get access to users secure information. Delinquencies are not restricted to mobile only. Some telecom carriers are doing this in the uncluttered, even on desktop browsers.
The accompanying perils are huge. Some cases of how Pakistanis are repaying the price are in the form of getting their PayPal and other financial services accounts blocked completely.
According to the recent report of Microsoft Security Intelligence, malware threat encounter rate in Pakistan is 60% as compared to the world’s average of 20%.
It is the right time that telecom carriers are held responsible and made to recompense charges before more web traffic accounts are traded for dollars. Especially before Pakistan makes it to the topmost in international reports about meager internet safety.