{"id":2065,"date":"2010-10-13T09:47:58","date_gmt":"2010-10-13T08:47:58","guid":{"rendered":"http:\/\/blog.intego.com\/?p=2065"},"modified":"2010-10-13T09:47:58","modified_gmt":"2010-10-13T08:47:58","slug":"keep-your-browsing-habits-hidden-from-google","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/","title":{"rendered":"Keep Your Browsing Habits Hidden from Google"},"content":{"rendered":"<p>Google&#8217;s tracking of your browsing habits is pernicious and insidious. Through its Google Analytics (a system used by web site owners to record statistics) and Google AdSense (the Google text ad system), Google has code on millions of web sites, and uses this code to follow your activity. Not only does Google know what you do on their own sites, but by using these other tools &#8211; Google Analytics, for example, is provided for free so Google can amass data &#8211; the company keeps track of which sites you visit and when.<\/p>\n<p>A new, free Safari extension called <a href=\"http:\/\/www.orbicule.com\/incognito\/\">Incognito<\/a>, by Orbicule, hides your activity from Google tracking. It can block Google AdSense and Google Analytics from recording your activity, and can also block the display of embedded YouTube movies (also owned by Google), and Facebook links as well. <\/p>\n<p>For those using Firefox, a similar tool called <a href=\"https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/60333\/\">Google Sharing<\/a>, allows users to anonymize their activity on Google sites. <\/p>\n<p>In either case, given that Google is collecting so much information, it can be a good idea to ensure that this information does not include anything about your activities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google&#8217;s tracking of your browsing habits is pernicious and insidious. Through its Google Analytics (a system used by web site owners to record statistics) and Google AdSense (the Google text ad system), Google has code on millions of web sites, and uses this code to follow your activity. Not only does Google know what you [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2066,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,11],"tags":[60,106],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Google&#039;s tracking of your browsing habits is pernicious and insidious. Through its Google Analytics (a system used by web site owners to record\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keep Your Browsing Habits Hidden from Google  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Google&#039;s tracking of your browsing habits is pernicious and insidious. Through its Google Analytics (a system used by web site owners to record\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-10-13T08:47:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/10\/154806-incognito_original.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"128\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/10\/154806-incognito_original.gif\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/10\/154806-incognito_original.gif\",\"width\":\"128\",\"height\":\"128\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/\",\"name\":\"Keep Your Browsing Habits Hidden from Google - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#primaryimage\"},\"datePublished\":\"2010-10-13T08:47:58+00:00\",\"dateModified\":\"2010-10-13T08:47:58+00:00\",\"description\":\"Google's tracking of your browsing habits is pernicious and insidious. Through its Google Analytics (a system used by web site owners to record\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Keep Your Browsing Habits Hidden from Google\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Keep Your Browsing Habits Hidden from Google\",\"datePublished\":\"2010-10-13T08:47:58+00:00\",\"dateModified\":\"2010-10-13T08:47:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#webpage\"},\"wordCount\":193,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/10\/154806-incognito_original.gif\",\"keywords\":[\"Google\",\"Privacy\"],\"articleSection\":[\"Security &amp; Privacy\",\"Software &amp; Apps\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Google's tracking of your browsing habits is pernicious and insidious. Through its Google Analytics (a system used by web site owners to record","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/","og_locale":"en_US","og_type":"article","og_title":"Keep Your Browsing Habits Hidden from Google  - The Mac Security Blog","og_description":"Google's tracking of your browsing habits is pernicious and insidious. Through its Google Analytics (a system used by web site owners to record","og_url":"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/","og_site_name":"The Mac Security Blog","article_published_time":"2010-10-13T08:47:58+00:00","og_image":[{"width":"128","height":"128","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/10\/154806-incognito_original.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/10\/154806-incognito_original.gif","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/10\/154806-incognito_original.gif","width":"128","height":"128"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/","name":"Keep Your Browsing Habits Hidden from Google - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#primaryimage"},"datePublished":"2010-10-13T08:47:58+00:00","dateModified":"2010-10-13T08:47:58+00:00","description":"Google's tracking of your browsing habits is pernicious and insidious. Through its Google Analytics (a system used by web site owners to record","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Keep Your Browsing Habits Hidden from Google"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Keep Your Browsing Habits Hidden from Google","datePublished":"2010-10-13T08:47:58+00:00","dateModified":"2010-10-13T08:47:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#webpage"},"wordCount":193,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/keep-your-browsing-habits-hidden-from-google\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/10\/154806-incognito_original.gif","keywords":["Google","Privacy"],"articleSection":["Security &amp; Privacy","Software &amp; Apps"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/10\/154806-incognito_original.gif","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-xj","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2065"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=2065"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2065\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/2066"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=2065"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=2065"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=2065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}