Cookies
Delete and block cookies from each specific site that erects porous paywalls, then block third-party cookies. By deleting and blocking cookies from specific sites, you'll never be able to log in and leave comments.
By universally blocking third-party cookies, you're no longer tracked by anyone and you won't have access to single-sign-in functionality for many apps and sites. This is the most difficult means to get around porous paywalls.
Javascript
By default, I block all javascript, for safety reasons. This means that I have to individually enable javascript to run on each website. If you block all javascript, all you need to do is eliminate the exception for the websites with porous paywalls. If you do not block all javascript, then all you need to do is to add an exception that blocks all javascript on those websites with porous paywalls.
By blocking javascript, you won't be able to watch embedded videos or use the comment sections, or any other function that was built with javascript. The side-benefit however, is that ads are blocked. This is easier to deal with, than blocking third-party cookies.
Going Private
By far the easiest method, open any website with porous paywalls, with a private browser. In Firefox this means using Private Browsing; in Chrome you're using Incognito; in IE you would use InPrivate Browsing; in Opera you would open a Private Tab; Safari you'd select Private Browsing.
Now, since these porous paywalls limit you to a number of free articles, when you do hit the limit, you must reset the session cookie by closing then reopening your private browser. This however, makes this method the easiest to use.
Now, there might be some who believe that these methods violate the DMCA, but they do not. These methods take advantage of a DMCA exception that allows you to circumvent protections that would otherwise allow someone to track personally-identifiable information. The functions used in Javascript are used to verify your ID; cookies obviously allow you to be tracked by name and IP.
(i) Protection of Personally Identifying Information. -
(1) Circumvention permitted. - Notwithstanding the provisions of subsection (a)(1)(A), it is not a violation of that subsection for a person to circumvent a technological measure that effectively controls access to a work protected under this title, if -
(A) the technological measure, or the work it protects, contains the capability of collecting or disseminating personally identifying information reflecting the online activities of a natural person who seeks to gain access to the work protected;
No comments:
Post a Comment