17.10.2017
Page 9 of 81
4 Use eBlocker optimally
4.1 Summary
After the activation process is done, we recommend you the following steps, so you can use eBlocker
as optimal as possible:
Delete the cookies, cache and browsing history in all used browsers.
Activate SSL (HTTPS-Support) in your eBlocker.
Adopt eBlocker's certificate into your operating system and if necessary, in the browsers
with their own certificate store as described in section 6.2.
Activate possible exception lists
for specific apps, so eBlocker can’t protect these apps
from third parties anymore.
You may define additional exceptions for encrypted connections (SSL)
– for example, for
websites in which eBlocker should not be active, like online-banking sites.
Find all detailed steps explained in the following.
4.2 Deleting cookies, cache and browsing history
eBlocker automatically blocks all data collecting cookies or other elements that identify you.
However, your browser has probably collected numerous tracking cookies of different providers
already. Therefore we recommend to
delete all your cookies
at first
, so the trackers “can lose their
track”.
You can read more about how to delete cookies in your respective browser in section
9.1
.
4.3 Activate support for HTTPS/SSL encrypted connections
How you can activate support for HTTPS/SSL encrypted connections, we describe in section
8.4
.
4.4 Activate exceptions for apps
How you can activate exceptions for apps, we describe in section
8.5
.
4.5 Final recommendation
We have developed our eBlocker very carefully and are constantly improving it. Nevertheless, our
eBlocker is no “magic pill” for privacy that works under all circumstances. Apps in particular which are
installed in your device/OS natively, represent an increased risk for your privacy. Therefore we
recommend to
not use any
apps at all
if possible.
Apps are very common today for accessing Internet services. However, they involve a greater risk for
your privacy, as when you use the same service through a browser. Why you should avoid apps to
protect your privacy, we explain below: