1 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN""http://www.w3.org/TR/html4/loose.dtd">
5 >General Information</TITLE
8 CONTENT="Modular DocBook HTML Stylesheet Version 1.79"><LINK
10 TITLE="Privoxy Frequently Asked Questions"
11 HREF="index.html"><LINK
13 TITLE="Privoxy Frequently Asked Questions"
14 HREF="index.html"><LINK
17 HREF="installation.html"><LINK
20 HREF="../p_doc.css"><META
21 HTTP-EQUIV="Content-Type"
23 charset=ISO-8859-1"></HEAD
34 SUMMARY="Header navigation table"
43 >Privoxy Frequently Asked Questions</TH
65 HREF="installation.html"
80 >1. General Information</A
88 >1.1. Who should give <SPAN
94 > Anyone who is interested in security, privacy, or in
95 finer-grained control over their web and Internet experience.
104 >1.2. Is Privoxy the best choice for
111 > is certainly a good choice, especially for those who want more
112 control and security. Those with the willingness to read the documentation
113 and the ability to fine-tune their installation will benefit the most.
120 strengths is that it is highly configurable giving you the ability to
121 completely personalize your installation. Being familiar with, or at least
122 having an interest in learning about <A
123 HREF="http://en.wikipedia.org/wiki/Http"
126 > and other networking
128 HREF="http://en.wikipedia.org/wiki/Html"
133 HREF="http://en.wikipedia.org/wiki/Regular_expressions"
141 will be a big plus and will help you get the most out of <SPAN
145 A new installation just includes a very basic configuration. The user
146 should take this as a starting point only, and enhance it as he or she
147 sees fit. In fact, the user is encouraged, and expected to, fine-tune the
154 > configuration can be done
156 HREF="http://en.wikipedia.org/wiki/Web_browser"
160 But there are areas where configuration is done using a
162 HREF="http://en.wikipedia.org/wiki/Text_editors"
166 to edit configuration files. Also note that the web-based action editor
167 doesn't use authentication and should only be enabled in environments
168 where all clients with access to <SPAN
171 > listening port can be trusted.
180 >1.3. What is a <SPAN
188 HREF="http://en.wikipedia.org/wiki/Proxy_server"
192 is a service, based on a software such as <SPAN
196 (i.e. browsers) can use instead of connecting to web servers directly.
197 The clients then ask the proxy to request objects (web pages, images, movies etc)
198 on their behalf and to forward the data to the clients.
204 HREF="http://en.wikipedia.org/wiki/Proxy_server"
206 >Wikipedia's proxy definition</A
210 > There are many reasons to use web proxies, such as security (firewalling),
211 efficiency (caching) and others, and there are any number of proxies
212 to accommodate those needs.
218 > is a proxy that is primarily focused on
219 privacy enhancement, ad and junk elimination and freeing the user from
220 restrictions placed on his activities. Sitting between your browser(s) and the Internet,
221 it is in a perfect position to filter outbound personal information that your
222 browser is leaking, as well as inbound junk. It uses a variety of techniques to do
223 this, all of which are under your complete control via the various configuration
224 files and options. Being a proxy also makes it easier to share
225 configurations among multiple browsers and/or users.
234 >1.4. Does Privoxy do anything more than ad blocking?</A
238 Yes, ad blocking is but one possible use. There are many, many ways <SPAN
242 can be used to sanitize and customize web browsing. </P
250 >1.5. What is this new version of
257 > A long time ago, there was the
259 HREF="http://www.junkbusters.com/ijb.html"
263 >Internet Junkbuster</SPAN
266 by Anonymous Coders and <A
267 HREF="http://www.junkbusters.com/"
271 >. This saved many users a lot of pain in the early days of
272 web advertising and user tracking.</P
274 > But the web, its protocols and standards, and with it, the techniques for
275 forcing ads on users, give up autonomy over their browsing, and
276 for tracking them, keeps evolving. Unfortunately, the <SPAN
280 > did not. Version 2.0.2, published in 1998, was
281 (and is) the last official
283 HREF="http://www.junkbusters.com/ijbdist.html#release"
288 HREF="http://www.junkbusters.com"
290 >Junkbusters Corporation</A
292 Fortunately, it had been released under the GNU
294 HREF="http://www.gnu.org/licenses/old-licenses/gpl-2.0.html"
298 which allowed further development by others.</P
300 > So Stefan Waldherr started maintaining an improved version of the
301 software, to which eventually a number of people contributed patches.
302 It could already replace banners with a transparent image, and had a first
303 version of pop-up killing, but it was still very closely based on the
304 original, with all its limitations, such as the lack of HTTP/1.1 support,
305 flexible per-site configuration, or content modification. The last release
306 from this effort was version 2.0.2-10, published in 2000.</P
310 HREF="http://www.privoxy.org/user-manual/copyright.html#AUTHORS"
314 picked up the thread, and started turning the software inside out, upside down,
315 and then reassembled it, adding many
317 HREF="http://www.privoxy.org/user-manual/introduction.html#FEATURES"
323 > The result of this is <SPAN
327 stable version, 3.0, was released August, 2002.
339 >? Why change the name from
340 Junkbuster at all?</A
343 > Though outdated, <A
344 HREF="http://junkbusters.com/"
346 >Junkbusters Corporation</A
348 continues to offer their original version of the <SPAN
356 >-derived software under the same name
359 > There are also potential legal complications from our use of the
363 > name, which is a registered trademark of
365 HREF="http://junkbusters.com/"
367 >Junkbusters Corporation</A
369 There are, however, no objections from Junkbusters Corporation to the
373 > project itself, and they, in fact, still
374 share our ideals and goals.</P
376 > The developers also believed that there are so many improvements over the original
377 code, that it was time to make a clean break from the past and make
378 a name in their own right.</P
390 >Privacy Enhancing Proxy</I
394 modification and junk suppression gives <SPAN
401 control, more freedom, and allows you to browse your personal and
419 >1.7. How does Privoxy differ
420 from the old Junkbuster?</A
434 > still blocks ads and banners,
436 HREF="http://en.wikipedia.org/wiki/Browser_cookie"
440 helps protect your privacy. But, most of these features have been enhanced,
441 and many new ones have been added, all in the same vein.
447 >'s new features include:</P
454 > Supports "Connection: keep-alive". Outgoing connections can
455 be kept alive independently from the client.
465 > Supports tagging which allows to change the behaviour
466 based on client and server headers.
471 > Can be run as an "intercepting" proxy, which obviates the need to
472 configure browsers individually.
477 > Sophisticated actions and filters for manipulating both server and client
483 > Can be chained with other proxies.
488 > Integrated browser-based configuration and control utility at <A
489 HREF="http://config.privoxy.org/"
491 >http://config.privoxy.org/</A
498 tracing of rule and filter effects. Remote toggling.
503 > Web page filtering (text replacements, removes banners based on size,
507 >, JavaScript and HTML annoyances,
508 pop-up windows, etc.)
513 > Modularized configuration that allows for standard settings and
514 user settings to reside in separate files, so that installing updated
515 actions files won't overwrite individual user settings.
520 > Support for Perl Compatible Regular Expressions in the configuration files, and
521 a more sophisticated and flexible configuration syntax.
531 > Bypass many click-tracking scripts (avoids script redirection).
536 > Multi-threaded (POSIX and native threads).
541 > User-customizable HTML templates for most proxy-generated pages (e.g. "blocked" page).
546 > Auto-detection and re-reading of config file changes.
551 > Improved signal handling, and a true daemon mode (Unix).
556 > Every feature now controllable on a per-site or per-location basis, configuration
557 more powerful and versatile over-all.
562 > Many smaller new features added, limitations and bugs removed.
574 >1.8. How does Privoxy know what is
575 an ad, and what is not?</A
581 >'s approach to blocking ads is twofold:</P
583 > First, there are certain patterns in the <SPAN
590 of banner images. This applies to both the path (you wouldn't guess how many
591 web sites serve their banners from a directory called <SPAN
595 and the host (blocking the big banner hosting services like doublecklick.net
596 already helps a lot). <SPAN
599 > takes advantage of this
601 HREF="../user-manual/actions-file.html#AF-PATTERNS"
605 > to sort out and block the requests for things that sound
606 like they would be ads or banners.</P
608 > Second, banners tend to come in certain <SPAN
615 can't tell the size of an image by its URL without downloading it, and if you
616 do, it's too late to save bandwidth. Therefore, <SPAN
620 also inspects the HTML sources of web pages while they are loaded, and replaces
621 references to images with standard banner sizes by dummy references, so that
622 your browser doesn't request them anymore in the first place.</P
624 > Both of this involves a certain amount of guesswork and is, of course, freely
625 and readily configurable.</P
633 >1.9. Can Privoxy make mistakes?
634 This does not sound very scientific.</A
637 > Actually, it's a black art ;-) And yes, it is always possible to have a broad
638 rule accidentally block or change something by mistake. You will almost surely
639 run into such situations at some point. It is tricky writing rules to
640 cover every conceivable possibility, and not occasionally get false positives.</P
642 > But this should not be a big concern since the
646 > configuration is very flexible, and
647 includes tools to help identify these types of situations so they can be
648 addressed as needed, allowing you to customize your installation.
650 HREF="trouble.html#BADSITE"
651 >See the Troubleshooting section below</A
660 >1.10. Will I have to configure Privoxy
661 before I can use it?</A
664 > That depends on your expectations.
665 The default installation should give you a good starting
666 point, and block <SPAN
672 > ads and unwanted content,
673 but many of the more advanced features are off by default, and require
674 you to activate them. </P
676 > You do have to set up your browser to use
681 HREF="installation.html#FIRSTSTEP"
682 >Installation section below</A
685 > And you will certainly run into situations where there are false positives,
686 or ads not being blocked that you may not want to see. In these cases, you
687 would certainly benefit by customizing <SPAN
691 configuration to more closely match your individual situation. And we
692 encourage you to do this. This is where the real power of
704 >1.11. Can Privoxy run as a server on a network?</A
711 > runs as a server already, and can easily be configured to
715 > more than one client. See <A
716 HREF="configuration.html#LANCONFIG"
717 > How can I set up Privoxy to act as a proxy for my LAN</A
726 >1.12. My browser does the same things as
727 Privoxy. Why should I use Privoxy at all?</A
730 > Modern browsers do indeed have <SPAN
737 functionality as <SPAN
741 adequate for you. But <SPAN
745 versatile and powerful, and can probably do a number of things
746 your browser just can't.
749 > In addition, a proxy is good choice if you use multiple browsers, or
750 have a LAN with multiple computers since <SPAN
753 > can run as a server
754 application. This way all the configuration is in one place, and you don't
755 have to maintain a similar configuration for possibly many browsers or
759 > Note, however, that it's recommended to leverage both your browser's
763 > privacy enhancing features
764 at the same time. While your browser probably lacks some features
768 > offers, it should also be able to do some things more
769 reliable, for example restricting and suppressing JavaScript.
778 >1.13. Why should I trust Privoxy?</A
781 > The most important reason is because you have access to
788 >, and you can control everything. You can
789 check every line of every configuration file yourself. You can check every
790 last bit of source code should you desire. And even if you can't read code,
791 there should be some comfort in knowing that other people can,
792 and do read it. You can build the software from scratch, if you want,
793 so that you know the executable is clean, and that it is
800 >. In fact, we encourage this level of scrutiny. It
801 is one reason we use <SPAN
813 >1.14. Is there is a license or fee? What about a
814 warranty? Registration?</A
820 > is free software and licensed under the <A
821 HREF="http://www.gnu.org/licenses/old-licenses/gpl-2.0.html"
823 >GNU General Public License (GPL) version 2</A
825 It is free to use, copy, modify or distribute as you wish under the terms of this
826 license. Please see the <A
827 HREF="copyright.html"
830 information on the license and copyright. Or the <TT
834 that should be included.
843 > of any kind, expressed, implied or otherwise.
844 That is something that would cost real money ;-) There is no registration either.
853 >1.15. Can Privoxy remove spyware? Adware? Viruses?</A
856 > No, at least not reliably enough to trust it. <SPAN
859 > is not designed to be
860 a malware removal tool and the default configuration doesn't even try to
861 filter out any malware.</P
866 > could help prevent contact from (known) sites that use such
867 tactics with appropriate configuration rules, and thus could conceivably
868 prevent contamination from such sites. However, keeping such a configuration
869 up to date would require a lot of time and effort that would be better spend
870 on keeping your software itself up to date so it doesn't have known
879 >1.16. Can I use Privoxy with other ad-blocking software?</A
885 > should work fine with other proxies and other software in general.</P
887 > But it is probably not necessary to use <SPAN
890 > in conjunction with other
891 ad-blocking products, and this could conceivably cause undesirable results.
892 It might be better to choose one software or the other and work a little to
893 tweak its configuration to your liking.</P
895 > Note that this is an advice specific to ad blocking.</P
902 NAME="HELP-THE-DEVELOPERS"
903 >1.17. I would like to help you, what can I do?</A
911 >1.17.1. Would you like to participate?</A
920 > need help. There is something for
921 everybody who wants to help us. We welcome new developers, packagers,
922 testers, documentation writers or really anyone with a desire to help in
933 >. There are many other tasks available. In fact,
934 the programmers often can't spend as much time programming because of some
935 of the other, more mundane things that need to be done, like checking the
936 Tracker feedback sections or responding to user questions on the mailing
940 > So first thing, subscribe to the <A
941 HREF="https://lists.sourceforge.net/lists/listinfo/ijbswa-users"
946 HREF="https://lists.sourceforge.net/lists/listinfo/ijbswa-developers"
950 > mailing list, join the discussion, help out other users, provide general
951 feedback or report problems you noticed.
954 > If you intend to help out with the trackers, you also might want to <A
955 HREF="https://sourceforge.net/account/register.php"
957 >get an account on SourceForge.net</A
959 so we don't confuse you with the other name-less users.
963 HREF="../developer-manual/index.html"
965 >Developer's Manual</A
967 While it is partly out of date, it's still worth reading.</P
970 HREF="http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/TODO?view=markup"
974 may be of interest to you as well.
975 Please let us know if you want to work on one of the items listed.</P
983 >1.17.2. Would you like to donate?</A
989 > is developed by unpaid volunteers
990 and thus our current running costs are pretty low. Nevertheless, we
991 have plans that will cost money in the future. We would like to get
992 this money through donations made by our users.</P
997 > has therefore become an associated
999 HREF="http://www.spi-inc.org/about-spi/about-spi"
1002 in the Public Interest (SPI)</A
1003 >, which allows us to receive tax-deductible
1004 donations in most western countries.</P
1006 > We intend to use the donations to pay for our domain after transfering
1007 it to SPI. Our goal is to make sure there's no single point of failure
1008 and the bill gets paid and the site keeps running even if a some of
1009 the currently active developers were to suddenly disappear for a while.</P
1011 > We would also like to spend some money on more reliable hosting,
1012 on hardware to help make sure <SPAN
1016 keeps running on platforms the developers currently can't test on,
1017 and on technical books to educate our developers about said platforms
1018 or to improve their knowledge in general.</P
1020 > If you enjoy our software and feel like helping out with a donation,
1021 please have a look at
1023 HREF="http://www.spi-inc.org/donations"
1025 >SPI's donation page</A
1027 to see what the options are.</P
1038 SUMMARY="Footer navigation table"
1067 HREF="installation.html"
1077 >Privoxy Frequently Asked Questions</TD