'Blur' Protects Against Online Tracking - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Software // Information Management
News
11/4/2014
12:23 PM
Connect Directly
LinkedIn
Twitter
RSS
E-Mail
50%
50%

'Blur' Protects Against Online Tracking

New tool blocks companies from tracking you online, lets you mask sensitive information such as email, phone number, and credit card information.

HP's 3D Future: Sprout Visual Tour
HP's 3D Future: Sprout Visual Tour
(Click image for larger view and slideshow.)

In a world of data breaches and websites that track your every move, protecting your personal information isn't easy. That's where Blur comes in. A new tool from online privacy company Abine, Blur lets you browse the Web without being tracked or forced to provide personal information in order to log in or complete transactions.

Blur's three main features include a password manager, a masking feature for sensitive information, and blocking capabilities against targeted ad networks and data collection companies. Abine CEO Rob Shavell said that the company's goals are to keep users safe using simple tools.

"We really believe that the future of protecting your privacy and security online is to stop giving so much information out in the first place," he said. "And the problem hasn't been that people are lazy and don't want to understand how some things work; it's that the software hasn't been easy enough to use. That's what we're aiming to do here."

[Popular social apps may track your every move. Read Location Tracking: 6 Social App Settings To Check.]

Blur uses a method it calls masking, which creates a new email address, phone number, or credit card to give a website for logins or purchases instead of using your real information.

If you give a site a masked email address and they send you a message, Blur will forward it to your real email address. It works the same way with phone calls: If someone calls your masked phone number, Blur will forward that call to your real phone number. In both cases you still receive those communications -- if you choose -- but without divulging your personal information.

Blur also lets you use masked credit cards -- a unique credit card number that is issued only for the amount of your purchase -- for online transactions.

"It's like making an instant gift card for an amount that's used only for that merchant," Shavell explained. Blur's servers then bill your real credit card for the amount of your purchase.

In addition to the masking technology, Blur prevents hundreds of websites, including Facebook, Google, and other data collection companies and targeted ad networks, from tracking your online browsing habits. You can also use Blur as a password manager to save your login and password details, which are encrypted and synced to all your devices.

Shavell said that Blur will remain ad-free and without conflicts of interest, relying instead on subscriptions to make money.

"People ask us, 'How can we trust you guys?' And we say you have to look at how the company makes money," Shavell said. "We don't have conflicts of interest, we don't have advertising, and have been very purposeful in setting up a business where the more privacy you want, the more money we make."

Blur offers both free and paid versions of the tool. The free version includes tracker blocking, masked emails, and the password manager feature. The paid version includes those features, plus masked credit cards and phone numbers, backup and sync options, and user support. Subscription options include $39 billed yearly; $59 for two years; or $79 for three years.

To be fully protected, you will need to download the add-on or app for every device you use. If you opt for the paid version of Blur, you'll be charged only once regardless of how many devices use it.

Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data. In the Partners' Role In Perimeter Security report, we'll discuss concrete strategies such as setting standards that third-party providers must meet to keep your business, conducting in-depth risk assessments -- and ensuring that your network has controls in place to protect data in case these defenses fail (free registration required).

Kristin Burnham currently serves as InformationWeek.com's Senior Editor, covering social media, social business, IT leadership and IT careers. Prior to joining InformationWeek in July 2013, she served in a number of roles at CIO magazine and CIO.com, most recently as senior ... View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Ariella
50%
50%
Ariella,
User Rank: Author
11/4/2014 | 7:40:42 PM
Re: another middle man...
@Thomas that's a good question. Would an additional fee be tacked on to the standar 2 or 3% for the sellers? 
Ariella
50%
50%
Ariella,
User Rank: Author
11/4/2014 | 7:40:41 PM
Re: another middle man...
@Thomas that's a good question. Would an additional fee be tacked on to the standar 2 or 3% for the sellers? 
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Author
11/4/2014 | 4:01:42 PM
another middle man...
I'd be curious to know how the revenue flows for temporary credit card numbers...does Abine collect a fee for that?
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

News
Becoming a Self-Taught Cybersecurity Pro
Jessica Davis, Senior Editor, Enterprise Apps,  6/9/2021
News
Ancestry's DevOps Strategy to Control Its CI/CD Pipeline
Joao-Pierre S. Ruth, Senior Writer,  6/4/2021
Slideshows
IT Leadership: 10 Ways to Unleash Enterprise Innovation
Lisa Morgan, Freelance Writer,  6/8/2021
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Slideshows
Flash Poll