Reddit is an American social news aggregation, web content rating, and discussion website. Registered members submit content to the site such as links, text posts, and images, which are then voted up or down by other members. Posts are organized by subject into user-created boards called “subreddits”. – Wikipedia.org
“Reddit is home to thousands of communities, endless conversation, and authentic human connection. Whether you’re into breaking news, sports, TV fan theories, or a never-ending stream of the internet’s cutest animals, there’s a community on Reddit for you.

Visit Reddit.com without Anonymous Startpage.com view on uMatrix 1.4.0 for Firefox, currently Reddit.com interacts with your device with:
5 cookies, all 9 from reddit.com so no third-party cookies.
20 Cascading Style Sheets (or CSS), 5 from Reddit.com, 19 from http://www.redditstatic.com; a style sheet language used for describing the presentation of a document written in a markup language like HTML. Privacy infringement: it allowed websites to uncover a user’s browsing history and figure out what sites the user had visited. Combined with other Web technology such as JavaScript or simply loading of background images, lets Web pages determine whether a URL is in the user’s history very quickly and without any interaction from the user. This is mitigated by browsers.
83 images, an (leaky) image can reveal whether the user is visiting a specific website. None from third-party sources.
1 media, viewing videos on the Internet might collect Personal Information.
34 scripts, all from either reddit.com or http://www.redditstatic.com; JavaScript tells all, which turns out not to be so great for privacy: Side-channel leaks can be exploited to follow you around the interweb. A JavaScript template Attacks will Automatically be Inferring Host Information for Targeted Exploits. JavaScript Template Attacks can be used for user fingerprinting. None from third-party sources.
7 XHR, a built-in browser object that allows to make HTTP requests in JavaScript. Despite of having the word “XML” in its name, it can operate on any data, not only in XML format. It uses user and password for login and password on basic HTTP auth. Using resources retrieved via XMLHttpRequest in your background page could fall victim to cross-site scripting. Guard yourself against malicious web pages that might try to impersonate a content script. In particular, do not allow content scripts to request an arbitrary URL. Use HTTPS whenever possible. None from third-party sources.
1 frame, (or XMLHttpRequest), from http://www.redditmedia.com; beware of a Frame Injection. Cross-site Scripting is naturally prioritized since it seems easily exploitable and effective. Hackers also are attracted to this vulnerability, because there are aspects of the Frame Injection attack that can allow them to redirect users to other malicious websites used for phishing and similar attacks.
1 other, non cookie, non CSS, non image, non media, non script, non XHR, non frame; from noscript-csp.invalid.
Visit Reddit.com with Anonymous Startpage.com view on uMatrix 1.4.0 for Firefox, currently Reddit.com interacts with your device with:
zero third party or Reddit.com cookies, CSS, images, media, scripts, XHR or frames!
But: 89 items of startpage.com itself (see below)
6 cookies
19 Cascading Style Sheets (or CSS)
27 images
0 media
29 scripts
3 XHR
5 frames
Final remarks, stated in the privacy policy of Startpage.com. We don’t collect any “personal data”. We don’t record your IP address. We don’t serve any tracking or identifying cookies. We don’t record your search queries. We don’t disclose or sell your contact information. Regarding governmental requests; they can’t request what we don’t have. We will never comply with any voluntary surveillance program. Startpage.com complies with the GDPR.
Please visit my website https://internetcookies.food.blog/ regularly. Select your own internet cookies (and other privacy related) control Add-Ins. Enjoy the reading!
