My former firewall had a "vault" feature to allow me to keep certain information (credit card numbers, etc) from being sent without my express permission. I had my internal IP (router 192.168.xxx.xxx) on that list. The information in the "vault" was encryted and not readable by anyone accessing the firewall "vault" page and presumably by any outsider trying to hack that firewall "vault" information. With that in place in my old firewall, when visiting
http://www.auditmypc.com/digital-footprint.asp and allowing/temporarily allowing that site in NoScript, the internal IP could not be seen by that site.
My new firewall does not have that "vault" feature. I am only concerned about website tracking, though I know that many others might have the same internal IP and tracking a specific user on a website would be difficult.
Is there a method within NoScript to keep the internal IP from being exposed when allowing a site in NoScript that might "snoop" for that information?
- If so, what would be exact steps that I need to take?
- If not, could such an option be considered in a future NoScript version?
Thanks