Submitted URL: http://edt.cio.com/c/17SnD5uc2sKel9N8XRCvAZaR8lnN
Effective URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_s...
Submission: On November 06 via api from US

Summary

This website contacted 69 IPs in 6 countries across 50 domains to perform 266 HTTP transactions. The main IP is 151.101.114.165, located in Frankfurt am Main, Germany and belongs to FASTLY - Fastly, US. The main domain is www.computerworld.com.
TLS certificate: Issued by GlobalSign CloudSSL CA - SHA256 - G3 on September 13th 2019. Valid for: 9 months.
This is the only time www.computerworld.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 151.101.194.49 54113 (FASTLY)
1 62 151.101.114.165 54113 (FASTLY)
1 2600:9000:20e... 16509 (AMAZON-02)
1 143.204.101.22 16509 (AMAZON-02)
1 13.224.196.15 16509 (AMAZON-02)
1 2.18.234.21 16625 (AKAMAI-AS)
3 23.111.9.35 33438 (HIGHWINDS2)
12 104.109.64.186 20940 (AKAMAI-ASN1)
1 2.18.234.163 16625 (AKAMAI-AS)
22 151.101.14.165 54113 (FASTLY)
3 18.194.227.247 16509 (AMAZON-02)
10 23.20.228.30 14618 (AMAZON-AES)
2 172.217.23.162 15169 (GOOGLE)
2 52.28.80.136 16509 (AMAZON-02)
2 2a00:1450:400... 15169 (GOOGLE)
1 104.19.149.54 13335 (CLOUDFLAR...)
2 2a00:1450:400... 15169 (GOOGLE)
4 34.231.100.212 14618 (AMAZON-AES)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a00:1450:400... 15169 (GOOGLE)
1 13.224.196.60 16509 (AMAZON-02)
4 2a00:1450:400... 15169 (GOOGLE)
1 199.166.0.26 7415 (ADSAFE-1)
1 13.225.78.11 16509 (AMAZON-02)
2 2.16.186.51 20940 (AKAMAI-ASN1)
2 151.101.14.110 54113 (FASTLY)
1 54.154.79.134 16509 (AMAZON-02)
11 2.18.234.190 16625 (AKAMAI-AS)
4 13 2.19.43.224 20940 (AKAMAI-ASN1)
7 2.18.70.82 16625 (AKAMAI-AS)
2 2a00:1450:400... 15169 (GOOGLE)
6 64.202.112.31 22075 (AS-OUTBRAIN)
4 2a00:1450:400... 15169 (GOOGLE)
2 54.231.176.198 16509 (AMAZON-02)
1 1 2606:2800:234... 15133 (EDGECAST)
2 151.101.112.157 54113 (FASTLY)
2 2a03:2880:f01... 32934 (FACEBOOK)
3 151.139.128.10 20446 (HIGHWINDS3)
1 2a00:1450:400... 15169 (GOOGLE)
3 35.201.67.47 15169 (GOOGLE)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 2 35.190.59.101 15169 (GOOGLE)
3 2a03:2880:f11... 32934 (FACEBOOK)
1 2 2a05:f500:10:... 14413 (LINKEDIN)
1 1 2a05:f500:10:... 14413 (LINKEDIN)
1 104.244.42.5 13414 (TWITTER)
1 35.190.40.172 15169 (GOOGLE)
2 151.101.114.2 54113 (FASTLY)
4 184.31.90.250 20940 (AKAMAI-ASN1)
1 52.72.8.4 14618 (AMAZON-AES)
8 69.16.175.10 20446 (HIGHWINDS3)
1 52.203.65.11 14618 (AMAZON-AES)
1 52.203.78.22 14618 (AMAZON-AES)
1 104.244.42.131 13414 (TWITTER)
2 151.101.114.217 54113 (FASTLY)
8 151.101.14.217 54113 (FASTLY)
1 34.195.95.173 14618 (AMAZON-AES)
1 70.42.32.31 22075 (AS-OUTBRAIN)
3 2a00:1450:400... 15169 (GOOGLE)
13 52.202.4.121 14618 (AMAZON-AES)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a02:26f0:10c... 20940 (AKAMAI-ASN1)
1 69.16.175.42 20446 (HIGHWINDS3)
1 2404:6800:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 52.59.120.88 16509 (AMAZON-02)
1 1 185.94.180.127 35220 (SPOTX-AMS)
1 2.18.232.234 16625 (AKAMAI-AS)
1 104.109.78.125 20940 (AKAMAI-ASN1)
2 159.180.84.2 33047 (INSTART)
1 2 185.94.180.126 35220 (SPOTX-AMS)
1 185.94.180.123 35220 (SPOTX-AMS)
266 69
Apex Domain
Subdomains
Transfer
65 computerworld.com
www.computerworld.com
cmp.computerworld.com
537 KB
24 connatix.com
cdn.connatix.com
cdns.connatix.com
ck.connatix.com
core.connatix.com
i.connatix.com
trk.connatix.com
v.connatix.com
208 KB
20 outbrain.com
widgets.outbrain.com
odb.outbrain.com
mcdp-nydc1.outbrain.com
libs.outbrain.com
mv.outbrain.com
videoclientsservicescalls.outbrain.com
videoadextradata.outbrain.com
vastcdn.outbrain.com
141 KB
13 scorecardresearch.com
sb.scorecardresearch.com
11 KB
12 idgesg.net
alt.idgesg.net
images.idgesg.net
744 KB
12 typekit.net
use.typekit.net
p.typekit.net
244 KB
11 vidazoo.com
static.vidazoo.com
bis.vidazoo.com
server.vidazoo.com
inventory.vidazoo.com
575 KB
11 blueconic.net
cdn.blueconic.net
idg.blueconic.net
173 KB
10 google.com
cse.google.com
adservice.google.com
www.google.com
clients1.google.com
ampcid.google.com
158 KB
10 staticworld.net
idge.staticworld.net
19 KB
8 skimresources.com
s.skimresources.com
p.skimresources.com
t.skimresources.com
r.skimresources.com
17 KB
8 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com
images.outbrainimg.com
267 KB
4 sphere.com
libs.sphere.com
74 KB
4 google-analytics.com
www.google-analytics.com
19 KB
4 postrelease.com
jadserve.postrelease.com
5 KB
3 spotxchange.com
sync.search.spotxchange.com
search.spotxchange.com
2 KB
3 googleapis.com
imasdk.googleapis.com
93 KB
3 linkedin.com
px.ads.linkedin.com
www.linkedin.com
2 KB
3 facebook.com
www.facebook.com
547 B
3 consensu.org
sourcepoint.mgr.consensu.org
api.skimlinks.mgr.consensu.org
2 KB
3 fontawesome.com
use.fontawesome.com
106 KB
2 digitru.st
cdn.digitru.st
11 KB
2 rubiconproject.com
prebid-server.rubiconproject.com
eus.rubiconproject.com
367 B
2 googlevideo.com
r3---sn-4g5e6nlk.googlevideo.com
r3---sn-4g5ednsl.googlevideo.com
747 KB
2 facebook.net
connect.facebook.net
95 KB
2 ads-twitter.com
static.ads-twitter.com
4 KB
2 twitter.com
platform.twitter.com
analytics.twitter.com
955 B
2 amazonaws.com
automate-prod.s3.amazonaws.com
178 KB
2 dwin2.com
www.dwin2.com
80 KB
2 akamaihd.net
ntvcld-a.akamaihd.net
102 KB
2 google.de
adservice.google.de
ampcid.google.de
288 B
2 googletagmanager.com
www.googletagmanager.com
73 KB
2 doubleclick.net
securepubads.g.doubleclick.net
73 KB
2 adsafeprotected.com
cdn.adsafeprotected.com
pixel.adsafeprotected.com
7 KB
1 spotxcdn.com
aka.spotxcdn.com
145 KB
1 spotx.tv
js.spotx.tv
588 B
1 gstatic.com
csi.gstatic.com
56 B
1 2mdn.net
s0.2mdn.net
10 KB
1 linksynergy.com
automate.linksynergy.com
592 B
1 t.co
t.co
449 B
1 licdn.com
snap.licdn.com
2 KB
1 adsrvr.org
match.adsrvr.org
542 B
1 webflow.com
uploads-ssl.webflow.com
1 KB
1 soundcloud.com
w.soundcloud.com
3 KB
1 permutive.com
cdn.permutive.com
103 KB
1 ntv.io
s.ntv.io
90 KB
1 indexww.com
js-sec.indexww.com
33 KB
1 cloudfront.net
d2zv5rkii46miq.cloudfront.net
2 KB
1 cio.com
edt.cio.com
633 B
0 rlcdn.com Failed
api.rlcdn.com Failed
266 50
Domain Requested by
62 www.computerworld.com 1 redirects www.computerworld.com
13 trk.connatix.com cdns.connatix.com
13 sb.scorecardresearch.com 4 redirects www.computerworld.com
11 use.typekit.net www.computerworld.com
s.ntv.io
10 widgets.outbrain.com www.computerworld.com
widgets.outbrain.com
libs.outbrain.com
libs.sphere.com
10 idge.staticworld.net www.computerworld.com
s.ntv.io
www.google.com
10 idg.blueconic.net cdn.blueconic.net
10 alt.idgesg.net www.computerworld.com
8 static.vidazoo.com libs.outbrain.com
static.vidazoo.com
6 v.connatix.com
6 images.outbrainimg.com www.computerworld.com
4 libs.sphere.com widgets.outbrain.com
libs.sphere.com
4 www.google-analytics.com www.googletagmanager.com
www.google-analytics.com
www.computerworld.com
4 www.google.com cse.google.com
www.computerworld.com
4 jadserve.postrelease.com s.ntv.io
www.computerworld.com
3 imasdk.googleapis.com cdns.connatix.com
imasdk.googleapis.com
3 mcdp-nydc1.outbrain.com widgets.outbrain.com
3 www.facebook.com www.computerworld.com
connect.facebook.net
3 t.skimresources.com www.computerworld.com
s.skimresources.com
3 cmp.computerworld.com www.computerworld.com
3 use.fontawesome.com www.computerworld.com
2 sync.search.spotxchange.com 1 redirects
2 cdn.digitru.st aka.spotxcdn.com
cdn.digitru.st
2 videoclientsservicescalls.outbrain.com libs.outbrain.com
libs.sphere.com
2 px.ads.linkedin.com 1 redirects www.computerworld.com
2 r.skimresources.com 1 redirects www.computerworld.com
2 p.skimresources.com www.computerworld.com
2 connect.facebook.net www.computerworld.com
connect.facebook.net
2 static.ads-twitter.com www.computerworld.com
2 automate-prod.s3.amazonaws.com www.computerworld.com
2 www.dwin2.com www.googletagmanager.com
www.dwin2.com
2 ntvcld-a.akamaihd.net www.computerworld.com
2 images.idgesg.net www.computerworld.com
2 adservice.google.com securepubads.g.doubleclick.net
imasdk.googleapis.com
2 cse.google.com www.computerworld.com
www.google.com
2 www.googletagmanager.com www.computerworld.com
www.googletagmanager.com
2 sourcepoint.mgr.consensu.org www.computerworld.com
2 securepubads.g.doubleclick.net www.computerworld.com
securepubads.g.doubleclick.net
1 search.spotxchange.com aka.spotxcdn.com
1 eus.rubiconproject.com static.vidazoo.com
1 aka.spotxcdn.com
1 js.spotx.tv 1 redirects
1 prebid-server.rubiconproject.com static.vidazoo.com
1 r3---sn-4g5ednsl.googlevideo.com
1 r3---sn-4g5e6nlk.googlevideo.com 1 redirects
1 csi.gstatic.com imasdk.googleapis.com
1 inventory.vidazoo.com
1 vastcdn.outbrain.com libs.sphere.com
1 s0.2mdn.net imasdk.googleapis.com
1 i.connatix.com
1 videoadextradata.outbrain.com libs.sphere.com
1 core.connatix.com cdns.connatix.com
1 ck.connatix.com cdns.connatix.com
1 cdns.connatix.com cdn.connatix.com
1 cdn.connatix.com www.computerworld.com
1 analytics.twitter.com static.ads-twitter.com
1 server.vidazoo.com static.vidazoo.com
1 bis.vidazoo.com static.vidazoo.com
1 automate.linksynergy.com www.computerworld.com
1 mv.outbrain.com widgets.outbrain.com
1 libs.outbrain.com widgets.outbrain.com
1 odb.outbrain.com widgets.outbrain.com
1 api.skimlinks.mgr.consensu.org s.skimresources.com
1 t.co www.computerworld.com
1 www.linkedin.com 1 redirects
1 snap.licdn.com www.computerworld.com
1 ampcid.google.de www.google-analytics.com
1 s.skimresources.com www.googletagmanager.com
1 ampcid.google.com www.google-analytics.com
1 platform.twitter.com 1 redirects
1 log.outbrainimg.com widgets.outbrain.com
1 clients1.google.com www.computerworld.com
1 tcheck.outbrainimg.com widgets.outbrain.com
1 match.adsrvr.org js-sec.indexww.com
1 uploads-ssl.webflow.com www.computerworld.com
1 pixel.adsafeprotected.com cdn.adsafeprotected.com
1 w.soundcloud.com www.googletagmanager.com
1 adservice.google.de securepubads.g.doubleclick.net
1 cdn.permutive.com www.computerworld.com
1 p.typekit.net www.computerworld.com
1 s.ntv.io www.computerworld.com
1 js-sec.indexww.com www.computerworld.com
1 cdn.adsafeprotected.com www.computerworld.com
1 cdn.blueconic.net www.computerworld.com
1 d2zv5rkii46miq.cloudfront.net www.computerworld.com
1 edt.cio.com 1 redirects
0 api.rlcdn.com Failed js-sec.indexww.com
266 87
Subject Issuer Validity Valid
idg.map.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-09-13 -
2020-06-13
9 months crt.sh
*.cloudfront.net
DigiCert Global CA G2
2019-07-17 -
2020-07-05
a year crt.sh
*.blueconic.net
Thawte RSA CA 2018
2017-12-13 -
2019-12-13
2 years crt.sh
*.adsafeprotected.com
COMODO RSA Domain Validation Secure Server CA
2018-08-20 -
2020-09-17
2 years crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-07-17 -
2020-03-09
8 months crt.sh
*.fontawesome.com
DigiCert SHA2 Secure Server CA
2019-10-28 -
2020-12-23
a year crt.sh
*.typekit.net
DigiCert SHA2 Secure Server CA
2018-07-20 -
2020-01-03
a year crt.sh
*.ntv.io
DigiCert SHA2 Secure Server CA
2018-06-12 -
2019-12-11
a year crt.sh
cmp.idg.de
Let's Encrypt Authority X3
2019-10-16 -
2020-01-14
3 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
sourcepoint.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2019-04-22 -
2020-04-29
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
ssl974613.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-08-21 -
2020-02-27
6 months crt.sh
*.google.com
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
*.postrelease.com
Amazon
2019-03-27 -
2020-04-27
a year crt.sh
*.soundcloud.com
GlobalSign Domain Validation CA - SHA256 - G2
2018-04-12 -
2020-06-08
2 years crt.sh
www.google.com
GTS CA 1O1
2019-10-16 -
2020-01-08
3 months crt.sh
uploads-ssl.webflow.com
Amazon
2018-12-22 -
2020-01-22
a year crt.sh
a248.e.akamai.net
DigiCert Secure Site ECC CA-1
2019-08-13 -
2020-08-12
a year crt.sh
f4.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-04-10 -
2020-03-21
a year crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2018-12-14 -
2020-03-14
a year crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
*.outbrainimg.com
DigiCert SHA2 Secure Server CA
2019-02-24 -
2020-05-25
a year crt.sh
*.s3.amazonaws.com
DigiCert Baltimore CA-2 G2
2018-11-07 -
2020-02-07
a year crt.sh
ads-twitter.com
DigiCert SHA2 High Assurance Server CA
2019-08-14 -
2020-08-18
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-09-22 -
2019-12-20
3 months crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
*.licdn.com
DigiCert SHA2 Secure Server CA
2019-04-01 -
2021-05-07
2 years crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2019-05-29 -
2021-06-29
2 years crt.sh
t.co
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
api.skimlinks.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2019-10-04 -
2021-10-07
2 years crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-07-30 -
2020-07-25
a year crt.sh
*.sphere.com
DigiCert SHA2 Secure Server CA
2019-03-15 -
2020-06-13
a year crt.sh
*.linksynergy.com
Thawte RSA CA 2018
2019-06-11 -
2021-07-18
2 years crt.sh
*.vidazoo.com
Sectigo RSA Domain Validation Secure Server CA
2019-03-20 -
2021-04-03
2 years crt.sh
bi-test.vidazoo.com
Let's Encrypt Authority X3
2019-09-19 -
2019-12-18
3 months crt.sh
adserver.vidazoo.com
Let's Encrypt Authority X3
2019-10-29 -
2020-01-27
3 months crt.sh
*.twitter.com
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
j3.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-11-06 -
2020-09-16
10 months crt.sh
*.connatix.com
Amazon
2019-10-19 -
2020-11-19
a year crt.sh
*.googleapis.com
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
*.doubleclick.net
GTS CA 1O1
2019-10-16 -
2020-01-08
3 months crt.sh
*.c.docs.google.com
GTS CA 1O1
2019-10-22 -
2019-12-31
2 months crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
cdn.spotxcdn.com
GeoTrust RSA CA 2018
2019-04-24 -
2020-05-23
a year crt.sh
cdn.digitru.st
Sectigo RSA Organization Validation Secure Server CA
2019-05-09 -
2021-05-08
2 years crt.sh
*.search.spotxchange.com
GeoTrust RSA CA 2018
2019-03-20 -
2021-04-21
2 years crt.sh
*.spotxchange.com
GeoTrust RSA CA 2018
2019-03-18 -
2021-03-17
2 years crt.sh

This page contains 14 frames:

Primary Page: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Frame ID: 2D4E81D14F13D2B1D20617831BF0DE2B
Requests: 233 HTTP requests in this frame

Frame: https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.6719579090293972
Frame ID: 82E79AB8041907D1129638DC2BB3B15B
Requests: 1 HTTP requests in this frame

Frame: https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Frame ID: 0B5B540E5519E661BE4C6E24319C5803
Requests: 1 HTTP requests in this frame

Frame: https://cdns.connatix.com/p/1784/min/connatix.renderer.infeed.min_dc.js
Frame ID: 8D104C246ACB7B33B81E578A747F0420
Requests: 25 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.348.2_en.html
Frame ID: D2DD63F7461EAB7D344FF55EFBED4684
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.348.2_en.html
Frame ID: 64E5E641CD9A9673485A69AFFCC3B6BC
Requests: 1 HTTP requests in this frame

Frame: https://static.vidazoo.com/basev/prebid/prebid.js
Frame ID: 85390F32C11D05917F3B7BA1C9E89C59
Requests: 2 HTTP requests in this frame

Frame: https://vastcdn.outbrain.com/frame?h=https%3A%2F%2Fwww.computerworld.com&id=obd2f133-318b-2a57-e5f6-bd8453595aff&url=https%3A%2F%2Frtr.innovid.com%2Fr1.5d259b75d6a577.80095753%3FobOrigUrl%3Dtrue
Frame ID: F0D851702F4D2F9E5895B9EB8A3DE647
Requests: 1 HTTP requests in this frame

Frame: https://static.vidazoo.com/basev/prebid/prebid.js
Frame ID: 50DC86D394F9409CF45AB1A3E4982D1A
Requests: 1 HTTP requests in this frame

Frame: https://static.vidazoo.com/basev/prebid/prebid.js
Frame ID: 0C3DE0DFA0CB1ECAFF4F72F6E0892182
Requests: 1 HTTP requests in this frame

Frame: https://static.vidazoo.com/basev/prebid/prebid.js
Frame ID: F8FC1A5701B92997D743AC74D5C4480F
Requests: 1 HTTP requests in this frame

Frame: https://static.vidazoo.com/basev/prebid/prebid.js
Frame ID: 703E2FE0990C19BC777D72E0FD3B4790
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html
Frame ID: A0CF3B6F502AD7FCE900368006C34704
Requests: 1 HTTP requests in this frame

Frame: https://cdn.digitru.st/prod/1.5.37/dt.html
Frame ID: 2D84B53C1DD832A725E27028BE059351
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://edt.cio.com/c/17SnD5uc2sKel9N8XRCvAZaR8lnN HTTP 302
    https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^Apache-Coyote(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers via /varnish(?: \(Varnish\/([\d.]+)\))?/i

Overall confidence: 100%
Detected patterns
  • headers server /^Apache-Coyote(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

266
Requests

98 %
HTTPS

29 %
IPv6

50
Domains

87
Subdomains

69
IPs

6
Countries

5150 kB
Transfer

12111 kB
Size

21
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://edt.cio.com/c/17SnD5uc2sKel9N8XRCvAZaR8lnN HTTP 302
    https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 97
  • https://www.computerworld.com/article/3451956/ HTTP 301
  • https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html
Request Chain 146
  • https://platform.twitter.com/oct.js HTTP 301
  • https://static.ads-twitter.com/oct.js
Request Chain 147
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035308&c3=&c5=Security&c6=Article%3A%20News%20Analysis&c15=3451956&ns__t=1573020490740&ns_c=UTF-8&cv=3.1e&c8=Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole%20%7C%20Computerworld&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035308&c3=&c5=Security&c6=Article%3A%20News%20Analysis&c15=3451956&ns__t=1573020490740&ns_c=UTF-8&cv=3.1e&c8=Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole%20%7C%20Computerworld&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c9=
Request Chain 165
  • https://r.skimresources.com/api/ HTTP 307
  • https://r.skimresources.com/api/?xguid=01DRZN7Q5FJNK9MCE15A5AXNN6&persistence=1&checksum=2c80f7144b7741de30d6fc46e0211bd8b640ee27b1cb5dd34841f857c6a06556
Request Chain 168
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=45909%2C1156330%2C116509&url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&time=1573020490941 HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D45909%252C1156330%252C116509%26url%3Dhttps%253A%252F%252Fwww.computerworld.com%252Farticle%252F3451956%252Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%253Futm_source%253DAdestra%2526utm_medium%253Demail%2526utm_content%253DDescription%25253A%252520Why%252520India%2525E2%252580%252599s%252520data%252520protection%252520law%252520needs%252520to%252520avoid%252520the%252520perfection%252520loophole%2526utm_campaign%253DThe%252520Daily%252520Byte%2526utm_term%253DThe%252520Daily%252520Byte%2526utm_date%253D20191106060809%26time%3D1573020490941%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=45909%2C1156330%2C116509&url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&time=1573020490941&liSync=true
Request Chain 234
  • https://r3---sn-4g5e6nlk.googlevideo.com/videoplayback?id=ec65ebd68eec3634&itag=22&source=youtube&requiressl=yes&mm=31&mn=sn-4g5e6nlk&ms=au&mv=m&mvi=2&pl=22&ei=TWPCXevYEsrt-gakwreQBg&susc=gvp&acao=yes&mime=video%2Fmp4&dur=6.060&lmt=1569581278085782&mt=1573020386&txp=2216222&ip=144.76.109.30&ipbits=0&expire=1573049293&sparams=ip%2Cipbits%2Cexpire%2Cid%2Citag%2Csource%2Crequiressl%2Cmm%2Cmn%2Cms%2Cmv%2Cmvi%2Cpl%2Cei%2Csusc%2Cacao%2Cmime%2Cdur%2Clmt&signature=D9527D96B891C36F550D1A2F8710BB6479DA57CA90B179DC8B4A561ECD6CE2EE.772583F68EF811A98210860C2C189CF7DF4FE6445907FBEBABCBD10868E20855&key=us0&cpn=V3ixKddqvrkMl236 HTTP 302
  • https://r3---sn-4g5ednsl.googlevideo.com/videoplayback?id=ec65ebd68eec3634&itag=22&source=youtube&requiressl=yes&mvi=2&pl=41&ei=TWPCXevYEsrt-gakwreQBg&susc=gvp&acao=yes&mime=video%2Fmp4&dur=6.060&lmt=1569581278085782&txp=2216222&ip=144.76.109.30&ipbits=0&expire=1573049293&sparams=acao,dur,ei,expire,id,ip,ipbits,ipbypass,itag,lmt,mime,mip,mm,mn,ms,mv,mvi,pl,requiressl,source,susc&signature=7425F73026D976FB1332758BB2670E5D66346E4F.0DF27DFAFA5874F2D56EC97185BA37E1D630ABCF&key=cms1&cpn=V3ixKddqvrkMl236&redirect_counter=1&rm=sn-4g5esk7s&fexp=23812954&req_id=7f9f2cc4f14236e2&cms_redirect=yes&ipbypass=yes&mip=2a01:4f8:192:5414::2&mm=31&mn=sn-4g5ednsl&ms=au&mt=1573020386&mv=m
Request Chain 252
  • https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=5&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=pause&ns_st_po=6098&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=6098&ns_st_dpt=6098&ns_st_ipt=6098&ns_st_et=6098&ns_st_det=6098&ns_st_upc=6098&ns_st_dupc=6098&ns_st_iupc=6098&ns_st_upa=6098&ns_st_dupa=6098&ns_st_iupa=6098&ns_st_lpc=6098&ns_st_dlpc=6098&ns_st_lpa=6098&ns_st_dlpa=6098&ns_st_pa=6212&ns_ts=1573020499635&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=1&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c8=&c9=&cs_ucfr=0 HTTP 302
  • https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=5&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=pause&ns_st_po=6098&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=6098&ns_st_dpt=6098&ns_st_ipt=6098&ns_st_et=6098&ns_st_det=6098&ns_st_upc=6098&ns_st_dupc=6098&ns_st_iupc=6098&ns_st_upa=6098&ns_st_dupa=6098&ns_st_iupa=6098&ns_st_lpc=6098&ns_st_dlpc=6098&ns_st_lpa=6098&ns_st_dlpa=6098&ns_st_pa=6212&ns_ts=1573020499635&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=1&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c8=&c9=&cs_ucfr=0
Request Chain 253
  • https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=6&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=end&ns_st_po=6098&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=6098&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=6098&ns_st_det=0&ns_st_upc=6098&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=6098&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=6098&ns_st_dlpc=0&ns_st_lpa=6098&ns_st_dlpa=0&ns_st_pa=6212&ns_ts=1573020499635&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=0&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c8=&c9=&cs_ucfr=0 HTTP 302
  • https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=6&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=end&ns_st_po=6098&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=6098&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=6098&ns_st_det=0&ns_st_upc=6098&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=6098&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=6098&ns_st_dlpc=0&ns_st_lpa=6098&ns_st_dlpa=0&ns_st_pa=6212&ns_ts=1573020499635&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=0&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c8=&c9=&cs_ucfr=0
Request Chain 254
  • https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=7&ns_st_sp=1&ns_st_sc=2&ns_st_psq=3&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=2&ns_st_spc=2&ns_st_cn=1&ns_st_ev=play&ns_st_po=0&ns_st_cl=189000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=0&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=0&ns_st_det=0&ns_st_upc=114&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=0&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=114&ns_st_dlpc=0&ns_st_lpa=0&ns_st_dlpa=0&ns_st_pa=6212&ns_ts=1573020499636&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c8=&c9=&cs_ucfr=0 HTTP 302
  • https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=7&ns_st_sp=1&ns_st_sc=2&ns_st_psq=3&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=2&ns_st_spc=2&ns_st_cn=1&ns_st_ev=play&ns_st_po=0&ns_st_cl=189000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=0&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=0&ns_st_det=0&ns_st_upc=114&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=0&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=114&ns_st_dlpc=0&ns_st_lpa=0&ns_st_dlpa=0&ns_st_pa=6212&ns_ts=1573020499636&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c8=&c9=&cs_ucfr=0
Request Chain 258
  • https://js.spotx.tv/directsdk/v1/265228.js HTTP 307
  • https://aka.spotxcdn.com/integration/directsdk/v1/directsdk.js
Request Chain 266
  • https://sync.search.spotxchange.com/partner?source=dados HTTP 302
  • https://sync.search.spotxchange.com/partner?source=dados&__user_check__=1&sync_id=d5a7ce66-005b-11ea-8984-173c25ca0a06

266 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html
www.computerworld.com/article/3451956/
Redirect Chain
  • http://edt.cio.com/c/17SnD5uc2sKel9N8XRCvAZaR8lnN
  • https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India...
140 KB
38 KB
Document
General
Full URL
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
b8587c7600d6eb9ab58b7e7ce49bec489c08a80b3f41ef453059ea6efd57c900

Request headers

:method
GET
:authority
www.computerworld.com
:scheme
https
:path
/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

status
200
server
Apache-Coyote/1.1
content-type
text/html;charset=UTF-8
content-encoding
gzip
accept-ranges
bytes bytes bytes
via
1.1 varnish 1.1 varnish
age
3724 0 3724
date
Wed, 06 Nov 2019 06:08:09 GMT
set-cookie
fastlyCountryCode=DE
x-served-by
cache-sjc3139-SJC, cache-sjc3139-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
x-cache
HIT, HIT, MISS, MISS
x-cache-hits
2, 2, 0, 0
x-timer
S1573020490.542242,VS0,VE154
vary
Accept-Encoding,Cookie
x-via-fastly
Verdad
x-vcl-version
92
content-length
38543

Redirect headers

Location
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Content-Length
0
Accept-Ranges
bytes
Date
Wed, 06 Nov 2019 06:08:09 GMT
Via
1.1 varnish
Age
0
Connection
keep-alive
X-Served-By
cache-hhn4034-HHN
X-Cache
MISS
X-Cache-Hits
0
X-Timer
S1573020489.174813,VS0,VE348
jquery-1.10.2.min.js
www.computerworld.com/www/js/jquery/
91 KB
32 KB
Script
General
Full URL
https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
b52e06f854795718703ef9723b47a9a23edcbe2ae53ff261926d8d6059056cfe

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
510872
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
10, 10, 1, 1
content-length
32790
x-via-fastly
Verdad
x-served-by
cache-sjc3141-SJC, cache-sjc3141-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:12 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.724087,VS0,VE1
etag
W/"93639-1572467652000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 06:09:56 GMT
jquery_cookie.js
www.computerworld.com/www/js/jquery/
2 KB
1 KB
Script
General
Full URL
https://www.computerworld.com/www/js/jquery/jquery_cookie.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
02d2940a00290f3a9e4955de7821626688c0cacde8c97c762838e6b40ab22926

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
484757
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
34, 34, 4, 4
content-length
908
x-via-fastly
Verdad
x-served-by
cache-sjc3149-SJC, cache-sjc3149-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:14 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.735778,VS0,VE0
etag
W/"1946-1572467654000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 13:25:00 GMT
apollo-locales.js
www.computerworld.com/www/js/
4 KB
2 KB
Script
General
Full URL
https://www.computerworld.com/www/js/apollo-locales.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
b84ac0cba0a1486af49abffafbd06bfe822297ae2f798e23670c97fdb908643e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
8271
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 2, 2
content-length
1330
x-via-fastly
Verdad
x-served-by
cache-sjc3143-SJC, cache-sjc3143-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:17:46 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.736111,VS0,VE0
etag
W/"3676-1572981466000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Wed, 13 Nov 2019 01:46:35 GMT
cmp_shim.js
d2zv5rkii46miq.cloudfront.net/0/latest/
4 KB
2 KB
Script
General
Full URL
https://d2zv5rkii46miq.cloudfront.net/0/latest/cmp_shim.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:20eb:7600:17:5578:e080:21 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
120fb2279d5061dd4a428f935fdf10c09e95c1f2ec0346f7aaf6c8b7f382cf49

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:07:55 GMT
content-encoding
gzip
last-modified
Fri, 06 Sep 2019 15:33:38 GMT
server
AmazonS3
age
675
etag
"1de86d90311bcd5ee000f2f732b294a9"
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA2-C1
accept-ranges
bytes
content-length
1698
via
1.1 f046bfa1468bb4385e357c8c9128cf51.cloudfront.net (CloudFront)
x-amz-cf-id
LTRyve5AyjsDTwynRAVvajRBagnuxS26G1uZoHRT9GhmvZBcKpRORg==
messaging.js
www.computerworld.com/www/js/
320 KB
69 KB
Script
General
Full URL
https://www.computerworld.com/www/js/messaging.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
b8932ea45d9e6be8c2bb5c87a77aca424d473366a6dc295bdb88ab5a2aed9e26

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
438414
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
44, 44, 1, 1
content-length
70595
x-via-fastly
Verdad
x-served-by
cache-sjc3150-SJC, cache-sjc3150-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Thu, 31 Oct 2019 18:18:28 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.736100,VS0,VE0
etag
W/"327421-1572545908000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Fri, 08 Nov 2019 02:17:09 GMT
idg.js
cdn.blueconic.net/
126 KB
38 KB
Script
General
Full URL
https://cdn.blueconic.net/idg.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.22 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-22.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
40a37e3c9ee0e4e0a324c344a876f62f30d7ed9be32adbfdb705cc46dfe8daa9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:02:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
age
328
x-cache
Hit from cloudfront
status
200
content-length
38647
x-xss-protection
1; mode=block
last-modified
Thu, 26 Sep 2019 15:48:48 GMT
server
Apache
etag
"1f7f2-59376b494f818-gzip"
vary
Accept-Encoding
content-type
text/javascript; charset=utf-8
via
1.1 009e5e3e32afcd1d135a7234c9da5521.cloudfront.net (CloudFront)
cache-control
public, max-age=600, s-maxage=500
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
x-robots-tag
noindex, nofollow
x-amz-cf-id
GiercfqDlt5-31MR5Rt-_I9Ky6sCp2UgkuRSDv9LuunYuIBgxRuZ_Q==
init_device.js
www.computerworld.com/www/js/
585 B
563 B
Script
General
Full URL
https://www.computerworld.com/www/js/init_device.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
4f4ed0e81c2f0016d06ae816dd872edc04e97612c9d36f2f3f4475f2954e7fcc

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
253382
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 4, 4
content-length
304
x-via-fastly
Verdad
x-served-by
cache-sjc3137-SJC, cache-sjc3137-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Thu, 31 Oct 2019 18:18:46 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.736095,VS0,VE0
etag
W/"585-1572545926000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Sun, 10 Nov 2019 05:38:44 GMT
iasPET.1.js
cdn.adsafeprotected.com/
19 KB
6 KB
Script
General
Full URL
https://cdn.adsafeprotected.com/iasPET.1.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.15 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-15.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
0e9324325e7bad86597c91ee8cf9e7f6bc0b83c6e03f29415e48511d19e64856

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Thu, 31 Oct 2019 21:15:44 GMT
Content-Encoding
gzip
Connection
keep-alive
Last-Modified
Mon, 21 Oct 2019 17:06:03 GMT
Server
AmazonS3
Age
463949
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 3aed5a4f89d72775aaf2cc5a5f642386.cloudfront.net (CloudFront)
Cache-Control
max-age=604800
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA2-C1
X-Amz-Cf-Id
bq2C1EkUnLwN4XujVBoFiOXsfpHxV6PVsyDJp9RpyQMlzr3fd29hlw==
183980-32335169869501.js
js-sec.indexww.com/ht/p/
110 KB
33 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/p/183980-32335169869501.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.21 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-21.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
9c475e04e541eaeea511b53598b8e115774bfa607f4459a3336ff57cc084cb4e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:10 GMT
Content-Encoding
gzip
Last-Modified
Wed, 06 Nov 2019 06:05:41 GMT
Server
Apache
ETag
"7632ed-1b77c-596a756ac9e8d"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=3598
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
33265
Expires
Wed, 06 Nov 2019 07:08:08 GMT
gpt_includes.js
www.computerworld.com/www/js/ads/
18 KB
5 KB
Script
General
Full URL
https://www.computerworld.com/www/js/ads/gpt_includes.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
ffc4c046b73cd1c8d52b507d522fe23f19ec3290a48e3963d31bda584de5c9f5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
30680
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 1, 1
content-length
5109
x-via-fastly
Verdad
x-served-by
cache-sjc3139-SJC, cache-sjc3139-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:17:22 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.740511,VS0,VE1
etag
W/"18330-1572981442000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:33:09 GMT
thm_pre.js
www.computerworld.com/www.idge/js/
23 KB
5 KB
Script
General
Full URL
https://www.computerworld.com/www.idge/js/thm_pre.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
432e0262764192d1d2fe77b5ea2fc06218eebbac5800fc568f507891bc4710da

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
30547
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
21, 21, 5, 5
content-length
4970
x-via-fastly
Verdad
x-served-by
cache-sjc3120-SJC, cache-sjc3120-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:14:36 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.740477,VS0,VE0
etag
W/"23063-1572981276000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:35:28 GMT
gpt_starter.js
www.computerworld.com/www/js/ads/
330 B
548 B
Script
General
Full URL
https://www.computerworld.com/www/js/ads/gpt_starter.js?1234
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
ad20d2d42fcbd58ad9c50a6e53db21bf4425be6f8237a41f109c2717c30b4067

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
436385
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
13, 13, 1, 1
content-length
238
x-via-fastly
Verdad
x-served-by
cache-sjc3146-SJC, cache-sjc3146-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Thu, 31 Oct 2019 18:18:20 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.740474,VS0,VE10
etag
W/"330-1572545900000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Fri, 08 Nov 2019 02:51:09 GMT
ias_gpt_launcher.js
www.computerworld.com/www/js/ads/
1 KB
762 B
Script
General
Full URL
https://www.computerworld.com/www/js/ads/ias_gpt_launcher.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
0afbd1c3e2da712bb4843aed36d9341b9ff3203b38826ffdf2bee00d2b4673c1

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
30688
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 3, 3
content-length
555
x-via-fastly
Verdad
x-served-by
cache-sjc3149-SJC, cache-sjc3149-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:17:18 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.740484,VS0,VE0
etag
W/"1196-1572981438000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:33:09 GMT
select2.css
www.computerworld.com/www.idge.ans/js/select2-3.5.0/
15 KB
3 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge.ans/js/select2-3.5.0/select2.css
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f91649026d2a05a646860a4be36a5388d5c78b4afc03f5ecd49adcad3c4449c3

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
100101
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
29, 29, 3, 3
content-length
2748
x-via-fastly
Verdad
x-served-by
cache-sjc3130-SJC, cache-sjc3130-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Mon, 04 Nov 2019 19:25:42 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.735522,VS0,VE0
etag
W/"15679-1572895542000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 00:16:15 GMT
article.css
www.computerworld.com/www/css/
231 KB
34 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www/css/article.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
4991392310910e93436471e2d799d6eeccfc4108fc686c31fa28158fb2e6ff53

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
30548
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
16, 16, 2, 2
content-length
34236
x-via-fastly
Verdad
x-served-by
cache-sjc3125-SJC, cache-sjc3125-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:15:30 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.735642,VS0,VE0
etag
W/"236624-1572981330000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:35:28 GMT
insider-promo-styles.css
www.computerworld.com/www.idge/css/
7 KB
2 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge/css/insider-promo-styles.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
38d4510c34bf1c09a3f7bac5337fd42b04e5f4355db6d5e4f16c5f38672da6ea

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
30545
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
17, 17, 1, 1
content-length
1717
x-via-fastly
Verdad
x-served-by
cache-sjc3122-SJC, cache-sjc3122-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:15:44 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.735614,VS0,VE9
etag
W/"7593-1572981344000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:35:28 GMT
article.css
www.computerworld.com/www.idge.ctw/css/
80 KB
10 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge.ctw/css/article.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
0c07b034e352fdc7fb38a73e41c2b5f2fa05a9f36b21fbca7b1dfc50c0f051d5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
8454
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
20, 20, 1, 1
content-length
9825
x-via-fastly
Verdad
x-served-by
cache-sjc3140-SJC, cache-sjc3140-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:15:20 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.735634,VS0,VE1
etag
W/"81797-1572981320000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Wed, 13 Nov 2019 01:43:44 GMT
ss-social.css
www.computerworld.com/www.idge/css/webfonts/
3 KB
1 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge/css/webfonts/ss-social.css
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
c2787f84ac525e6b202f56eb25ef03f40017d11100280dd6f3866cadb4d1f50c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
415330
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
6, 6, 4, 4
content-length
906
x-via-fastly
Verdad
x-served-by
cache-sjc3150-SJC, cache-sjc3150-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Thu, 31 Oct 2019 18:16:42 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.735862,VS0,VE0
etag
W/"3417-1572545802000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Fri, 08 Nov 2019 08:42:10 GMT
ss-standard.css
www.computerworld.com/www.idge/css/webfonts/
11 KB
3 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge/css/webfonts/ss-standard.css
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
b59054e128a42511aa22399d02cd8365ac1c66a6efe6f4f11cfe1ae16284db0c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
235878
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
10, 10, 4, 4
content-length
2488
x-via-fastly
Verdad
x-served-by
cache-sjc3142-SJC, cache-sjc3142-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Thu, 31 Oct 2019 18:16:44 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.735855,VS0,VE0
etag
W/"11639-1572545804000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Sun, 10 Nov 2019 10:33:13 GMT
all.css
use.fontawesome.com/releases/v5.6.1/css/
52 KB
13 KB
Stylesheet
General
Full URL
https://use.fontawesome.com/releases/v5.6.1/css/all.css
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.111.9.35 Phoenix, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
453893f7daa3d8fe9716f8c6d0f36f8ade8cacfc0093e164f4f998b46427959e

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
last-modified
Wed, 12 Dec 2018 17:44:03 GMT
server
NetDNA-cache/2.2
status
200
etag
W/"b8085bf2c839791244bd95f56fb93c01"
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
access-control-allow-methods
GET
content-type
text/css
access-control-allow-origin
*
access-control-max-age
3000
cache-control
max-age=31556926
x-cache
HIT
cav2eef.css
use.typekit.net/
9 KB
1 KB
Stylesheet
General
Full URL
https://use.typekit.net/cav2eef.css
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
4ea52185e69db285388a469849af2a50e38a7584915fea49ccbb7f9ace34ec26
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains;
content-encoding
gzip
server
nginx
status
200
date
Wed, 06 Nov 2019 06:08:09 GMT
vary
Accept-Encoding
content-type
text/css;charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=600, stale-while-revalidate=604800
timing-allow-origin
*
content-length
1122
select2.js
www.computerworld.com/www.idge.ans/js/select2-3.5.0/
77 KB
19 KB
Script
General
Full URL
https://www.computerworld.com/www.idge.ans/js/select2-3.5.0/select2.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f88f33a736ef0e7d27d78a7b2cdadb674ac192db9aede3a42c65ea1fd4386114

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
320878
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 2, 2
content-length
19639
x-via-fastly
Verdad
x-served-by
cache-sjc3142-SJC, cache-sjc3142-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Thu, 31 Oct 2019 18:18:00 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.740611,VS0,VE0
etag
W/"79220-1572545880000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Sat, 09 Nov 2019 10:54:49 GMT
alc_hashes.js
www.computerworld.com/www/js/utils/
25 KB
9 KB
Script
General
Full URL
https://www.computerworld.com/www/js/utils/alc_hashes.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
db33949c354930ab2bc413270504c302a1b724c6d8403827f4423a78875eeb9b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
506756
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
15, 15, 3, 3
content-length
9201
x-via-fastly
Verdad
x-served-by
cache-sjc3135-SJC, cache-sjc3135-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:18 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.740612,VS0,VE0
etag
W/"25218-1572467658000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 07:18:02 GMT
insider_reg_api.js
www.computerworld.com/www/js/insider/
60 KB
21 KB
Script
General
Full URL
https://www.computerworld.com/www/js/insider/insider_reg_api.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
207c61e54e03245104c55ae42aa5340dfe8664ec2b44763f003f6ae924a62175

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
30688
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 3, 3
content-length
21704
x-via-fastly
Verdad
x-served-by
cache-sjc3131-SJC, cache-sjc3131-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:17:40 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.740591,VS0,VE0
etag
W/"61880-1572981460000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:33:09 GMT
jquery.maskedinput-1.4.min.js
www.computerworld.com/www/js/insider/
4 KB
2 KB
Script
General
Full URL
https://www.computerworld.com/www/js/insider/jquery.maskedinput-1.4.min.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
d61ee6f4c7b8572833d3bdad303493033c896a58ca134680319e3c4bef8756bb

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
496428
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
52, 52, 3, 3
content-length
1852
x-via-fastly
Verdad
x-served-by
cache-sjc3129-SJC, cache-sjc3129-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:22 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.740630,VS0,VE0
etag
W/"4139-1572467662000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 10:10:47 GMT
ads.js
www.computerworld.com/www/js/ads/
19 B
362 B
Script
General
Full URL
https://www.computerworld.com/www/js/ads/ads.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
6a0f6cf6b4648c192d81b5fc7b70cb2f6819ef4a799e421e8626cae9697aa85a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
516697
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
85, 85, 3, 3
content-length
39
x-via-fastly
Verdad
x-served-by
cache-sjc3150-SJC, cache-sjc3150-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:04 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.740625,VS0,VE0
etag
W/"19-1572467644000"
vary
Cookie, Accept-Encoding
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 04:32:57 GMT
load.js
s.ntv.io/serve/
302 KB
90 KB
Script
General
Full URL
https://s.ntv.io/serve/load.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.163 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-163.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
7ac551c78b2e3f14fa4d2470d662b314de4dc008204fed17404ca4e2947a77e4

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:09 GMT
Content-Encoding
gzip
x-amz-request-id
CC3B7BAE01D94D61
x-amz-server-side-encryption
AES256
Transfer-Encoding
chunked
Connection
keep-alive, Transfer-Encoding
x-amz-id-2
HzFfpTOQ4Zk1jMPo7q5P0LqbnLEaX2zVFxPDSlmnHuQdZWC+zhz41jJXlFlmHcEGS8slfmN38Cs=
Last-Modified
Wed, 06 Nov 2019 00:45:55 GMT
Server
AmazonS3
ETag
"0cba66609c095baf3fc6a4c023a8aa9c"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
oc-header.css
www.computerworld.com/www/css/
36 KB
7 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www/css/oc-header.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
304224b9e870d344e3d6ceef9b6634324b6d1ebe2030262344bfd9a92f4b193a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
30537
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 1, 1
content-length
7171
x-via-fastly
Verdad
x-served-by
cache-sjc3144-SJC, cache-sjc3144-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:15:26 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.735873,VS0,VE0
etag
W/"36806-1572981326000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:35:35 GMT
oc-header.css
www.computerworld.com/www.idge.ctw/css/
10 KB
3 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge.ctw/css/oc-header.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
66a087f40546676b05722792e553fcaa9c62b877b8fba1d4000adc89d5b179d2

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
30555
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 5, 5
content-length
2632
x-via-fastly
Verdad
x-served-by
cache-sjc3148-SJC, cache-sjc3148-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:15:16 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.735827,VS0,VE0
etag
W/"10229-1572981316000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:35:20 GMT
computerworld-np-logo.svg
alt.idgesg.net/images/furniture/computerworld/
5 KB
5 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/computerworld/computerworld-np-logo.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
fbde5f5195daee9344171d4b753ec948c89c78fae738c85662432d2479a582ca

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
VXJsmyyqi4vY7mR.hRFZCUDOCbFB9IKX
via
1.1 varnish, 1.1 varnish
etag
"b91b6866cc8b3a705dea84d8bd5c6297"
age
3306
x-amz-meta-origin-date-iso8601
2019-03-28T14:19:52.000Z
x-cache
HIT, HIT
status
200
content-length
4705
x-amz-id-2
P434pFC5Tk99QtU04vZfr3Ht0brQEsEojipTqZ7J4EPoW3mzN784daCG0CWS+coJe0pbgHd4Z60=
x-served-by
cache-jfk8127-JFK, cache-fra19153-FRA
last-modified
Thu, 28 Mar 2019 14:46:20 GMT
server
AmazonS3
x-timer
S1573020490.889623,VS0,VS0,VE3
date
Wed, 06 Nov 2019 06:08:09 GMT
x-amz-request-id
E632B841C6BEEA05
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
3, 1
get_site_data
cmp.computerworld.com/
19 B
256 B
XHR
General
Full URL
https://cmp.computerworld.com/get_site_data?account_id=146&href=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&requestUUID=c37df61c-3d60-4fd4-a425-78ee8c7ba958-1573020489857
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/messaging.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.194.227.247 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-194-227-247.eu-central-1.compute.amazonaws.com
Software
Jetty(9.4.2.v20170220) /
Resource Hash
7301e4c498be91461d67a037fa33683168f7f313060ca9c0e3eede9782192daf

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
x-sp-mms-node
mms-aka.node.fra.consul
server
Jetty(9.4.2.v20170220)
status
200
access-control-allow-methods
GET
content-type
text/plain
access-control-allow-origin
https://www.computerworld.com
cache-control
max-age=2592000
access-control-allow-credentials
true
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
76 KB
15 KB
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&bcsessionid=&bctempid=&overruleReferrer=&time=2019-11-06T07%3A08%3A09%2B01%3A00&ts=1573020489897
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.20.228.30 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-20-228-30.compute-1.amazonaws.com
Software
- /
Resource Hash
7427f08e629aa91716d507b6bfb8e519bdb1706ccee789351bd6eba80bb3474d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
14819
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
content-ribbon.css
www.computerworld.com/www/css/
2 KB
779 B
Stylesheet
General
Full URL
https://www.computerworld.com/www/css/content-ribbon.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
fd66d8dc41c06a99c3877934b3af8d38de72f3a94db252c0b9474bec35014491

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
30689
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 1, 1
content-length
522
x-via-fastly
Verdad
x-served-by
cache-sjc3142-SJC, cache-sjc3142-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:15:24 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.909053,VS0,VE7
etag
W/"1829-1572981324000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:33:09 GMT
date-time-moments.js
www.computerworld.com/www/js/
121 KB
32 KB
Script
General
Full URL
https://www.computerworld.com/www/js/date-time-moments.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
5156e9286b87b1e03f6151c2bb29ad54d2b9da4df874a23c742a0693bdc209a1

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
520241
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
7, 7, 1, 1
content-length
32313
x-via-fastly
Verdad
x-served-by
cache-sjc3143-SJC, cache-sjc3143-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:16 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.965470,VS0,VE1
etag
W/"123832-1572467656000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 03:29:44 GMT
twitter.svg
idge.staticworld.net/images/
1 KB
1 KB
Image
General
Full URL
https://idge.staticworld.net/images/twitter.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
464e7cde418a559c5035942d1ab154d5d906f378f256a0dd39848d197df6180d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
mIV1aQJqOkkgyHLgPXYdWBvfLAAcgw1y
via
1.1 varnish, 1.1 varnish
etag
"5c2cee17abf8296b156fa142e69516df"
age
5195
x-cache
HIT, HIT
status
200
content-length
1128
x-amz-id-2
b2+I5LSStbNzAFWcTvXdnoOCEOMT71vxd+VHkp3TQWNkwFg99Qe42lWR71xeNeSw5w7NzvHFZyc=
x-served-by
cache-jfk8147-JFK, cache-fra19153-FRA
last-modified
Tue, 27 Mar 2018 00:10:11 GMT
server
AmazonS3
x-timer
S1573020490.985536,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:09 GMT
x-amz-request-id
585ED1411B406E87
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
7, 6
facebook.svg
idge.staticworld.net/images/
817 B
1 KB
Image
General
Full URL
https://idge.staticworld.net/images/facebook.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
676aa6d4090a54ea6893484095f55c80659fb8538db100cdb8ce1dc82bab42b8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
z0fEqr9qBUOYVzkAEhE7W.44xxx.2BcQ
via
1.1 varnish, 1.1 varnish
etag
"e54119fb283fa31d7980c946d19e701f"
age
4372
x-cache
HIT, HIT
status
200
content-length
817
x-amz-id-2
PAo7jP/TPINy3/PF5IcELqQrx5WV1YGhkTAK2yydftTzCGKFrombJzrjwPr5ITwj91fXoiLIoJU=
x-served-by
cache-jfk8137-JFK, cache-fra19153-FRA
last-modified
Tue, 27 Mar 2018 00:10:09 GMT
server
AmazonS3
x-timer
S1573020490.985567,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:09 GMT
x-amz-request-id
CE0402E6E84346E9
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
1, 7
linkedin.svg
idge.staticworld.net/images/
786 B
1 KB
Image
General
Full URL
https://idge.staticworld.net/images/linkedin.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
03643efcf63e8fbfe6571cd0f1a4ce49f8575a7bee74f2e9fd7fab344e474e48

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
dIfJAJb7rR9o.DnrV3iep_mz2NuSUCHZ
via
1.1 varnish, 1.1 varnish
etag
"b828f13d2d6015e831f675f1ca0c1908"
age
4182
x-cache
HIT, HIT
status
200
content-length
786
x-amz-id-2
NG/Lb6neJe7zvD2Yjj8MCGU3/IV+KLqL2yvWhjlVSFOVuI4HgSrjLv8rVeejwa3elr5SpTkoDaY=
x-served-by
cache-jfk8146-JFK, cache-fra19153-FRA
last-modified
Tue, 27 Mar 2018 00:10:10 GMT
server
AmazonS3
x-timer
S1573020490.985761,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:09 GMT
x-amz-request-id
F619758198A8825E
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
2, 6
reddit.svg
idge.staticworld.net/images/
2 KB
2 KB
Image
General
Full URL
https://idge.staticworld.net/images/reddit.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
47c749c888c850505d68f2745651928d8aec9a6802d6a8b20869fa114af92277

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
X1o6g.mfoioyv5Lswf3F9n.2ID0CCWF9
via
1.1 varnish, 1.1 varnish
etag
"8159d85ae759a8d251edb65b4dcd285d"
age
3398
x-cache
HIT, HIT
status
200
content-length
1556
x-amz-id-2
DGsKZrrnALU3z5jwOlnClRd3XNZbzn0aaesXxau92bgkhepB1HvzbLFdvXsIH0ADTPpvzUw10pY=
x-served-by
cache-jfk8148-JFK, cache-fra19153-FRA
last-modified
Tue, 27 Mar 2018 00:10:10 GMT
server
AmazonS3
x-timer
S1573020490.985764,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:09 GMT
x-amz-request-id
7BD513E1C3D27790
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
4, 3
mail.svg
idge.staticworld.net/images/
631 B
878 B
Image
General
Full URL
https://idge.staticworld.net/images/mail.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
83d86c9e7359ed844c0e7682abcd5cdb65222d421c61156f17791ac6c2650274

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
W1fLolU3CaghgVscFveqAiphPY036Sqp
via
1.1 varnish, 1.1 varnish
etag
"c8fc97e05e008a042825f64ee7d414d1"
age
2079
x-cache
HIT, HIT
status
200
content-length
631
x-amz-id-2
r7JUpm1jygvMBzExuc1aDFqhlRTbQ2fIVy5NMQ/zxDgtP6voE0NG8WgeM9/aip8NFxDJLM9W8ko=
x-served-by
cache-jfk8142-JFK, cache-fra19153-FRA
last-modified
Tue, 27 Mar 2018 00:10:10 GMT
server
AmazonS3
x-timer
S1573020490.985737,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:09 GMT
x-amz-request-id
CE4A58FB8F65E109
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
1, 4
print.svg
idge.staticworld.net/images/
782 B
1019 B
Image
General
Full URL
https://idge.staticworld.net/images/print.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1b197985c0bef8bc365381bd16e15dccf184eb33d0abf0afdb4f567da2000fb2

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
.7Gmo7QCRJqJTxCocIfBynAqOGj25mL.
via
1.1 varnish, 1.1 varnish
etag
"a9f65e3b5eddc5c537118a146a3333c7"
age
4182
x-cache
HIT, HIT
status
200
content-length
782
x-amz-id-2
mVzOi+RHspq7jQMPALTsbZf2lcNHfh0kG/si5fUH1RQ3cJ9935Y/yQLTT+zqgHXOda2wec6yD9o=
x-served-by
cache-jfk8150-JFK, cache-fra19153-FRA
last-modified
Tue, 27 Mar 2018 00:10:10 GMT
server
AmazonS3
x-timer
S1573020490.985759,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:09 GMT
x-amz-request-id
46D6EC99850912FE
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
2, 5
stickyLb.js
www.computerworld.com/www/js/ads/
4 KB
1 KB
Script
General
Full URL
https://www.computerworld.com/www/js/ads/stickyLb.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f6bbd3540733be952a2921b2e4716d3b5190d5897510efcf9baa09649a1eaedf

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
493350
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 1, 1
content-length
1257
x-via-fastly
Verdad
x-served-by
cache-sjc3128-SJC, cache-sjc3128-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:02 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.974162,VS0,VE10
etag
W/"3657-1572467642000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 10:58:46 GMT
deal-modules.js
www.computerworld.com/www/js/
783 B
602 B
Script
General
Full URL
https://www.computerworld.com/www/js/deal-modules.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
cdf2700459ab474c9e19ccf7a3b9c6044a6cf2f2ff7bb0e1ab7bde2304409c87

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
427885
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
4, 4, 1, 1
content-length
345
x-via-fastly
Verdad
x-served-by
cache-sjc3141-SJC, cache-sjc3141-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Thu, 31 Oct 2019 18:18:22 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.984352,VS0,VE8
etag
W/"783-1572545902000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Fri, 08 Nov 2019 05:13:05 GMT
gpt.js
securepubads.g.doubleclick.net/tag/js/
48 KB
15 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/ads/gpt_starter.js?1234
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.162 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s22-in-f2.1e100.net
Software
sffe /
Resource Hash
1af6a0ce54967db44d13cf01ff4368ff02bc5c322dde54fd7222992acc670f2d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"328 / 939 of 1000 / last-modified: 1572985346"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
15465
x-xss-protection
0
expires
Wed, 06 Nov 2019 06:08:09 GMT
print.css
www.computerworld.com/www.idge/css/
2 KB
978 B
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge/css/print.css
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
a5e5c781317ce492049cb1f9e1deec67c47bbe5dbd03ec12f688cf7a221a79f2

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
age
522466
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
4, 4, 4, 4
content-length
733
x-via-fastly
Verdad
x-served-by
cache-sjc3139-SJC, cache-sjc3139-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:32:28 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.985694,VS0,VE0
etag
W/"1871-1572467548000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 02:56:29 GMT
p.css
p.typekit.net/
5 B
168 B
Stylesheet
General
Full URL
https://p.typekit.net/p.css?s=1&k=cav2eef&ht=tk&f=2007.2008.2009.2010.2011.6808.6809.8415.6846.6847.6848.6851&a=25545821&app=typekit&e=css
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
1c0ff118a4290c99f39c90abb38703a866e47251b23cca20266c69c812ccafeb

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
last-modified
Mon, 04 Feb 2019 20:01:41 GMT
server
nginx
etag
"5c589a25-5"
status
200
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
content-length
5
expires
Wed, 08 May 2019 15:16:03 GMT
gdpr-status
sourcepoint.mgr.consensu.org/consent/v2/
43 B
324 B
XHR
General
Full URL
https://sourcepoint.mgr.consensu.org/consent/v2/gdpr-status?siteId=3919
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/messaging.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.28.80.136 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-28-80-136.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
1e8e9b90a66e1741a5300ee65d6fab837aab5c3f0a32a523d85002ae53154c9c

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
status
200
access-control-allow-methods
GET, PUT, POST, DELETE
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Accept, Authorization
content-length
43
get_loaders
cmp.computerworld.com/mms/
552 B
791 B
XHR
General
Full URL
https://cmp.computerworld.com/mms/get_loaders?href=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&account_id=146&requestUUID=c37df61c-3d60-4fd4-a425-78ee8c7ba958-1573020489857
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/messaging.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.194.227.247 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-194-227-247.eu-central-1.compute.amazonaws.com
Software
Jetty(9.4.2.v20170220) /
Resource Hash
708f2f6a1e23c0ef47ab8e948a239163724d874d8b6cf8c9d4f85302f45fa3e1

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
x-sp-mms-node
mms-az8.node.fra.consul
server
Jetty(9.4.2.v20170220)
status
200
access-control-allow-methods
GET
content-type
application/json
access-control-allow-origin
https://www.computerworld.com
cache-control
max-age=10800
access-control-allow-credentials
true
gtm.js
www.googletagmanager.com/
145 KB
39 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-WR6LD2P
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
fdfa909978be5df56365aae0ce4f207a3e51d7e89931e823c922be73525895cf
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
br
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
39877
x-xss-protection
0
expires
Wed, 06 Nov 2019 06:08:09 GMT
f5b3be27-f789-4ef1-8867-37c67da5b361-web.js
cdn.permutive.com/
530 KB
103 KB
Script
General
Full URL
https://cdn.permutive.com/f5b3be27-f789-4ef1-8867-37c67da5b361-web.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.19.149.54 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
410e2dab86e7ed449683e8d42cb633b2d7ad6f1ea0c6e0dc9bac008de175509b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
content-encoding
gzip
cf-cache-status
HIT
age
1643
x-guploader-uploadid
AEnB2UogrpoQBSPmUX-pIkbVNwZCwc5o_YO_m-z9LvRASsk17T_XME3FVeryctgZHvHW-nunOoN2rLmyWUijJ09_LrhPtiOK6w
x-goog-storage-class
REGIONAL
status
200
x-goog-metageneration
1
x-goog-stored-content-encoding
gzip
alt-svc
clear
last-modified
Wed, 06 Nov 2019 01:40:40 GMT
server
cloudflare
etag
"8acea4e02ed57f2a4943b81d3185cc3d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=ldr1dg==, md5=is6k4C7VfypJQ7gdMYXMPQ==
x-goog-generation
1573004440481700
content-type
application/javascript
cache-control
public, max-age=300
x-goog-stored-content-length
105425
cf-ray
5314e42e6e9fbed8-FRA
expires
Wed, 06 Nov 2019 06:13:09 GMT
computerworld-fn-logo.svg
alt.idgesg.net/images/furniture/computerworld/
3 KB
3 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/computerworld/computerworld-fn-logo.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
4209120a30a7a319d6507061f8f71225945381d170c4f6b3ffe27eb62f5ce71a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/www.idge.ctw/css/oc-header.css?v=20191105111835
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
r87wEEd68oWg5pMu7uEsBdSEN1WwRACR
via
1.1 varnish, 1.1 varnish
etag
"3353ba5a59fd365823787859ed7cfefe"
age
4442
x-amz-meta-origin-date-iso8601
2019-03-28T14:22:37.000Z
x-cache
HIT, HIT
status
200
content-length
2973
x-amz-id-2
sY/H6WGydWQ5njVfd/PIPXcnoH2TVl8WVveHZ2dfm5EdbotxKVmZBBU2J/2weqDh0JliNmfcFtg=
x-served-by
cache-jfk8142-JFK, cache-fra19153-FRA
last-modified
Thu, 28 Mar 2019 14:46:19 GMT
server
AmazonS3
x-timer
S1573020490.995285,VS0,VS0,VE2
date
Wed, 06 Nov 2019 06:08:09 GMT
x-amz-request-id
57160896AB077BD6
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
2, 1
insider-logo-updated.svg
idge.staticworld.net/images/
3 KB
3 KB
Image
General
Full URL
https://idge.staticworld.net/images/insider-logo-updated.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
90e7f8120f6d2e856e3a487abe2551c75bea54bee192a5a9b8afa4a0216eefa6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/www.idge.ctw/css/oc-header.css?v=20191105111835
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
CqyWtbm.VH6O14ZU_g_VPqkHhNPzIAa5
via
1.1 varnish, 1.1 varnish
etag
"6f2e6c9e8e4cba254e168d6355376522"
age
3950
x-cache
HIT, HIT
status
200
content-length
3102
x-amz-id-2
cU4FqkidAmsgLVYvaKpgehltalsY3aKRzAVXz+jMXF/b6Uy0CYhBR7uFmy/zMyJJtcI+I77JWI4=
x-served-by
cache-jfk8126-JFK, cache-fra19153-FRA
last-modified
Tue, 27 Mar 2018 00:10:09 GMT
server
AmazonS3
x-timer
S1573020490.995321,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:09 GMT
x-amz-request-id
03EC36E21B64A565
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
1, 5
fa-regular-400.woff2
use.fontawesome.com/releases/v5.6.1/webfonts/
15 KB
15 KB
Font
General
Full URL
https://use.fontawesome.com/releases/v5.6.1/webfonts/fa-regular-400.woff2
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.111.9.35 Phoenix, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
e5c1d9e7bdeaf3372dee724d175d25aca879ed52ae9afd018f503e9d74e09b50

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.fontawesome.com/releases/v5.6.1/css/all.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
last-modified
Wed, 12 Dec 2018 17:44:23 GMT
server
NetDNA-cache/2.2
status
200
etag
"569693c9f5d42d769c7f87b90856219a"
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
access-control-allow-methods
GET
content-type
font/woff2
access-control-allow-origin
*
access-control-max-age
3000
cache-control
max-age=31556926
x-cache
HIT
accept-ranges
bytes
content-length
14868
fa-solid-900.woff2
use.fontawesome.com/releases/v5.6.1/webfonts/
77 KB
78 KB
Font
General
Full URL
https://use.fontawesome.com/releases/v5.6.1/webfonts/fa-solid-900.woff2
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.111.9.35 Phoenix, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
08aa3a5ee68a21d5771a70b20495b6da1c0f996c46982cd1b0447ad2db730d11

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.fontawesome.com/releases/v5.6.1/css/all.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:09 GMT
last-modified
Wed, 12 Dec 2018 17:44:35 GMT
server
NetDNA-cache/2.2
status
200
etag
"59ea9019c9b9bc4d83ab9783e830735c"
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
access-control-allow-methods
GET
content-type
font/woff2
access-control-allow-origin
*
access-control-max-age
3000
cache-control
max-age=31556926
x-cache
HIT
accept-ranges
bytes
content-length
79072
cse.js
cse.google.com/
11 KB
4 KB
Script
General
Full URL
https://cse.google.com/cse.js?cx=011881588825642368632:cnkmmv0dvim
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
gws /
Resource Hash
a0220749e35eb7e4fba3db7145a0e684269a7dc9e2078a53622db884b524e79a
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
br
server
gws
x-frame-options
SAMEORIGIN
p3p
CP="This is not a P3P policy! See g.co/p3phelp for more info."
status
200
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
3488
x-xss-protection
0
expires
Wed, 06 Nov 2019 06:08:10 GMT
logic
sourcepoint.mgr.consensu.org/consent/v2/3919/
1 KB
2 KB
XHR
General
Full URL
https://sourcepoint.mgr.consensu.org/consent/v2/3919/logic?withSiteActions=true&consentUUID=[CONSENT_UUID]&euconsent=[EUCONSENT]&mmsDomain=cmp.computerworld.com&hasConsentData&consentedToAny&consentedToAll&shortCircuitDetection&requestUUID=c37df61c-3d60-4fd4-a425-78ee8c7ba958-1573020489857
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/messaging.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.28.80.136 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-28-80-136.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
d87f9c509f331565732deafe51921bf742c4d46de5dd7d888f39e34b5bf479f1

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
status
200
access-control-allow-methods
GET, PUT, POST, DELETE
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Accept, Authorization
content-length
1405
t
jadserve.postrelease.com/
28 KB
4 KB
Script
General
Full URL
https://jadserve.postrelease.com/t?ntv_url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&ntv_mvi
Requested by
Host: s.ntv.io
URL: https://s.ntv.io/serve/load.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.100.212 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-231-100-212.compute-1.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
655d60e55b5b8e80b12e19f285589f41c6dd18720d7fffdd56dd57a6e7e933a8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
server
nginx/1.12.1
status
200
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
text/javascript;charset=UTF-8
content-length
3341
expires
Mon, 1 Jan 1990 12:00:00 GMT
hamburger-v2.svg
alt.idgesg.net/images/furniture/
610 B
925 B
Image
General
Full URL
https://alt.idgesg.net/images/furniture/hamburger-v2.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
413215e01c47f149df91c6d2281bc5288980420466333b3190d2807c1a5a6966

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/www/css/oc-header.css?v=20191105111835
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
1fnsULWZsCA3r7yvlAPj1P80IHmK7W6x
via
1.1 varnish, 1.1 varnish
etag
"cf32478c18a5e4e5ee7de7180fb12c18"
age
3200
x-amz-meta-origin-date-iso8601
2018-12-17T19:19:51.000Z
x-cache
HIT, HIT
status
200
content-length
610
x-amz-id-2
VxObjjqYAkw9cZLe7aNK2UrvskxTCnL7floNQHsvqAaSYA9SUKXZjD6WS0vqmFOSwohZdmZNxbk=
x-served-by
cache-jfk8138-JFK, cache-fra19153-FRA
last-modified
Mon, 17 Dec 2018 19:20:57 GMT
server
AmazonS3
x-timer
S1573020490.058878,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:10 GMT
x-amz-request-id
07A704D53728BB87
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
4, 3
computerworld-mm-bkg.jpg
alt.idgesg.net/images/furniture/computerworld/
102 KB
102 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/computerworld/computerworld-mm-bkg.jpg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ea5fe8b85e681bf6d538f25020ff0a5b009347afc6d559428ab106cc4424b9c1

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/www.idge.ctw/css/oc-header.css?v=20191105111835
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
DJgh8YdxuMHi7AK3jXJqy7QHT8eOGscF
via
1.1 varnish, 1.1 varnish
etag
"159036f40a49885cfe4bffa06d820857"
age
263069
x-amz-meta-origin-date-iso8601
2019-03-28T14:09:09.000Z
x-cache
HIT, HIT
status
200
content-length
104478
x-amz-id-2
xW7Rhwka8gTVpTr1udcaCypt82/OI64jzBH70CUhhWUdxYwymFwRsFOOK4cZxtuLEzsEHXFEudU=
x-served-by
cache-jfk8142-JFK, cache-fra19153-FRA
last-modified
Thu, 28 Mar 2019 14:24:18 GMT
server
AmazonS3
x-timer
S1573020490.058907,VS0,VS0,VE3
date
Wed, 06 Nov 2019 06:08:10 GMT
x-amz-request-id
48FC2A22794F50C2
cache-control
public, max-age=2592000
accept-ranges
bytes
content-type
image/jpeg
x-cache-hits
1, 1
megamenu-ip-logo.svg
alt.idgesg.net/images/furniture/insiderpro/megamenu/
5 KB
5 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/insiderpro/megamenu/megamenu-ip-logo.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
cc8104c2421ddba0fee8e079eb7f771f4c14ec71c0c714d67c530afcbf761766

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/www/css/oc-header.css?v=20191105111835
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
kNgQwgxS9UBWR4a1aGMjvH18qrlDRyAS
via
1.1 varnish, 1.1 varnish
etag
"7bea921263c2f7aa1454205785963338"
age
2954
x-amz-meta-origin-date-iso8601
2019-06-26T10:33:19.159Z
x-cache
HIT, HIT
status
200
content-length
4898
x-amz-id-2
lHG39bXy8iGf5PoWqobiLP2oQnaWpITGMEcStIZ3wKcAf1R/NnxxC/IA4mVtBgF7o1zkfuOTZqE=
x-served-by
cache-jfk8132-JFK, cache-fra19153-FRA
last-modified
Wed, 26 Jun 2019 10:33:59 GMT
server
AmazonS3
x-timer
S1573020490.059232,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:10 GMT
x-amz-request-id
A91524165F2F57E8
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
6, 3
l
use.typekit.net/af/cafa63/00000000000000000001709a/27/
45 KB
45 KB
Font
General
Full URL
https://use.typekit.net/af/cafa63/00000000000000000001709a/27/l?primer=fff1a989570eb474b8c22c57cc7199e63bfc7e911b750165d0199218f0b7e7cc&fvd=n4&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
d68114d793040cf8dbfe03d8efed8eea73785e53e6878fa2f6e0899842f912b7

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
server
nginx
etag
"dca08fa48313f64edf1cb207c7e9765f05f80f6d"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
45940
ss-standard.woff
www.computerworld.com/www.idge/css/webfonts/
26 KB
27 KB
Font
General
Full URL
https://www.computerworld.com/www.idge/css/webfonts/ss-standard.woff
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
d2aae940b6d023c99cbd656bbd0868f51bcf4a93455efef42cc95d8a4c7bceca

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/www.idge/css/webfonts/ss-standard.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
6883
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
27058
x-via-fastly
Verdad
x-served-by
cache-sjc3121-SJC, cache-sjc3121-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:14:36 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.061098,VS0,VE0
etag
W/"27096-1572981276000-gzip"
vary
Accept-Encoding,Cookie
content-type
font/woff
via
1.1 varnish, 1.1 varnish
x-vcl-version
92
accept-ranges
bytes
x-cache-hits
1, 1, 2, 2
l
use.typekit.net/af/1b1b1e/00000000000000000001709e/27/
45 KB
45 KB
Font
General
Full URL
https://use.typekit.net/af/1b1b1e/00000000000000000001709e/27/l?primer=fff1a989570eb474b8c22c57cc7199e63bfc7e911b750165d0199218f0b7e7cc&fvd=n7&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
a143438dc0b9ddc61bc901440e0b90cd0d39b09a9129443ee68acadc7cf85ead

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
server
nginx
etag
"3ebf20ca2634841fd6a3314769e4f1e3097888a0"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
45740
ss-social-circle.woff
www.computerworld.com/www.idge/css/webfonts/
10 KB
10 KB
Font
General
Full URL
https://www.computerworld.com/www.idge/css/webfonts/ss-social-circle.woff
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
8982bee74ee4a24031eea6ffe2cf2a3a41b3eee01490dfb4b8a641ef69dc923f

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/www.idge/css/webfonts/ss-social.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
7661
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
9716
x-via-fastly
Verdad
x-served-by
cache-sjc3142-SJC, cache-sjc3142-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:14:36 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.061064,VS0,VE0
etag
W/"9732-1572981276000-gzip"
vary
Accept-Encoding,Cookie
content-type
font/woff
via
1.1 varnish, 1.1 varnish
x-vcl-version
92
accept-ranges
bytes
x-cache-hits
4, 4, 2, 2
integrator.js
adservice.google.de/adsid/
109 B
171 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.computerworld.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
122 B
184 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.computerworld.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
8c6f6fd21ce92ecd6631160cd4464543c34f96113348eda3ea6de3d32052e592
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
117
x-xss-protection
0
pubads_impl_2019103101.js
securepubads.g.doubleclick.net/gpt/
159 KB
58 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019103101.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.23.162 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s22-in-f2.1e100.net
Software
sffe /
Resource Hash
e4ab34b8a905b1076f36fddd2dc1e2dacd9c1bbca6614ab260e9b40aa0dced41
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 31 Oct 2019 13:10:21 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
59272
x-xss-protection
0
expires
Wed, 06 Nov 2019 06:08:10 GMT
aaxLXolentRfnwtdiwiLXx2IyxWL1RIPXh6eiguJy12IntUSEtNPXh5KVR9eCUsfD0rfH18Kyt8K1Q9LHwsLCIoJ3YrfH18Kyt8K1Q9LHwsLCIoJ3YmfCwseH58dnooLictVEc9Iy9USUVHRUhIT089ent6VDAiJ3soMEV2LCl2RSYsfkV2IictfCsneCVFent6SD...
cmp.computerworld.com/
17 KB
18 KB
Script
General
Full URL
https://cmp.computerworld.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
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/messaging.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.194.227.247 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-194-227-247.eu-central-1.compute.amazonaws.com
Software
Jetty(9.4.2.v20170220) /
Resource Hash
e759feb9e928bc4c0fd734df98afb417d9a113daacff97cee249b7eb2c4ef673

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 06:08:10 GMT
x-sp-mms-node
mms-az8.node.fra.consul
server
Jetty(9.4.2.v20170220)
access-control-allow-methods
GET
content-type
application/javascript
status
200
cache-control
no-store, no-cache, private
access-control-allow-credentials
true
x-sp-mms-env
1
expires
Sat, 15 Nov 2008 16:00:00 GMT
6515fdc4-b1bc-46ec-91d4-ad162dd31278
https://www.computerworld.com/
3 KB
0
Other
General
Full URL
blob:https://www.computerworld.com/6515fdc4-b1bc-46ec-91d4-ad162dd31278
Requested by
Host: cdn.permutive.com
URL: https://cdn.permutive.com/f5b3be27-f789-4ef1-8867-37c67da5b361-web.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
33240dafa889a235e51d923c736a077200b4a402ad6d44ab2653e35688f5c8ae

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Length
3267
Content-Type
application/javascript
embedder-jwp.js
www.computerworld.com/www/js/video/
2 KB
894 B
Script
General
Full URL
https://www.computerworld.com/www/js/video/embedder-jwp.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f0b97fc49950832323730d508911fa12bd098eca0670ccb3a18ada5af3a34699

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
30632
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
3, 3, 3, 3
content-length
640
x-via-fastly
Verdad
x-served-by
cache-sjc3128-SJC, cache-sjc3128-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:17:44 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.202285,VS0,VE0
etag
W/"1760-1572981464000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:33:09 GMT
tso-links.css
www.computerworld.com/www.idgcsmb/css/
991 B
727 B
Stylesheet
General
Full URL
https://www.computerworld.com/www.idgcsmb/css/tso-links.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
b42412a0e2fd452601f89dc9119e8dc4c563d204e6a54ba2f91e7c046f9de3a4

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
30569
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
24, 24, 1, 1
content-length
473
x-via-fastly
Verdad
x-served-by
cache-sjc3145-SJC, cache-sjc3145-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:14:54 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.206456,VS0,VE7
etag
W/"991-1572981294000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:35:11 GMT
foot.css
www.computerworld.com/www.idge/css/
7 KB
2 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge/css/foot.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
8a767979bca69766fa34fd523e09d32633804e2560756d9c1d3c614574d94ab2

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
fastly-restarts
1
age
30554
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
3, 3, 1, 1
content-length
1600
x-via-fastly
Verdad
x-served-by
cache-sjc3137-SJC, cache-sjc3137-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:15:42 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.206591,VS0,VE1
etag
W/"7225-1572981342000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:35:20 GMT
foot.css
www.computerworld.com/www.idge.ctw/css/
4 KB
1 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge.ctw/css/foot.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
bda519e2c1f6de2bd75b5f721ea1d93980ac32226ed6a23764878c5d255c832e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
30666
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 3, 3
content-length
1080
x-via-fastly
Verdad
x-served-by
cache-sjc3146-SJC, cache-sjc3146-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:15:16 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.206553,VS0,VE0
etag
W/"4482-1572981316000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:33:09 GMT
logo-footer-white.png
alt.idgesg.net/images/logos/
2 KB
3 KB
Image
General
Full URL
https://alt.idgesg.net/images/logos/logo-footer-white.png
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
537d7a2ee55484fcb24cea45dd4593d1f478d83545b0399616af969a69c88c41

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
edGv5yqk7j95QLH6YobDRVsDJWVAgek8
via
1.1 varnish, 1.1 varnish
etag
"503ef0c72f7205129e4048cf0aea6fe9"
age
1131495
x-amz-meta-origin-date-iso8601
2018-07-16T13:16:57.000Z
x-cache
HIT, HIT
status
200
content-length
2259
x-amz-id-2
8r8cbkuT5JZ68yGQrmlSMnC7ewn6qxO9lg0VhydFVq2FXs7EIF6dCCkSY/4Ue61G5RFtVmFm67I=
x-served-by
cache-jfk8127-JFK, cache-fra19153-FRA
last-modified
Mon, 16 Jul 2018 13:17:37 GMT
server
AmazonS3
x-timer
S1573020490.206796,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:10 GMT
x-amz-request-id
989DC7847203244C
cache-control
public, max-age=2592000
accept-ranges
bytes
content-type
image/png
x-cache-hits
2, 31
jquery-ui.js
www.computerworld.com/www/js/jquery/
292 KB
70 KB
Script
General
Full URL
https://www.computerworld.com/www/js/jquery/jquery-ui.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
66b5ca68288cc2506f1c5709fe38cebccca428406a7ce96e392718203666d503

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
506745
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
4, 4, 4, 4
content-length
70949
x-via-fastly
Verdad
x-served-by
cache-sjc3120-SJC, cache-sjc3120-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:16 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.206558,VS0,VE0
etag
W/"299210-1572467656000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 07:18:45 GMT
jquery.dfp.min.js
www.computerworld.com/www/js/jquery/
4 KB
2 KB
Script
General
Full URL
https://www.computerworld.com/www/js/jquery/jquery.dfp.min.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
053d5c873a012d89c7a079d097426cfddb18b28494a55c51eff89e0294540dfd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
512780
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
9, 9, 2, 2
content-length
1750
x-via-fastly
Verdad
x-served-by
cache-sjc3149-SJC, cache-sjc3149-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:12 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.206822,VS0,VE0
etag
W/"4433-1572467652000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 05:37:42 GMT
shortstack_nav.js
www.computerworld.com/www.idge/js/mule/
2 KB
735 B
Script
General
Full URL
https://www.computerworld.com/www.idge/js/mule/shortstack_nav.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
fb6b1425ff73fe62d725a3981ac08d9f57e16e14d5ae321c617e21e1d7403d1f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
516673
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
5, 5, 4, 4
content-length
480
x-via-fastly
Verdad
x-served-by
cache-sjc3136-SJC, cache-sjc3136-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:42 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.206798,VS0,VE0
etag
W/"2129-1572467682000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 04:33:02 GMT
tracking.js
www.computerworld.com/www/js/analytics/
1 KB
792 B
Script
General
Full URL
https://www.computerworld.com/www/js/analytics/tracking.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
607bfd152e5c762ba0f0502f653c7bbb546ad7955e792a9840d4ae28a8219423

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
513098
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 1, 1
content-length
538
x-via-fastly
Verdad
x-served-by
cache-sjc3127-SJC, cache-sjc3127-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:06 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.206783,VS0,VE0
etag
W/"1075-1572467646000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 05:32:51 GMT
autocomplete.js
www.computerworld.com/www/js/
1 KB
857 B
Script
General
Full URL
https://www.computerworld.com/www/js/autocomplete.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
c7e1ddc2de3256e9b1db3c3733f38a74a9cdcbf1c424d559519f85cfe0e321ba

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
505515
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
6, 6, 1, 1
content-length
627
x-via-fastly
Verdad
x-served-by
cache-sjc3123-SJC, cache-sjc3123-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:16 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.206745,VS0,VE0
etag
W/"1254-1572467656000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 07:38:12 GMT
jquery.colorbox-min.js
www.computerworld.com/www.idge/js/jquery/plugins/
11 KB
5 KB
Script
General
Full URL
https://www.computerworld.com/www.idge/js/jquery/plugins/jquery.colorbox-min.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f370d6bd05df8e6a5b671f06e038c4d85d95dc5446fdeb8f8762e817882a8322

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
8064
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 2, 2
content-length
4634
x-via-fastly
Verdad
x-served-by
cache-sjc3138-SJC, cache-sjc3138-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:17:54 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.206726,VS0,VE0
etag
W/"11081-1572981474000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Wed, 13 Nov 2019 01:50:04 GMT
article.js
www.computerworld.com/www.idge/js/
2 KB
870 B
Script
General
Full URL
https://www.computerworld.com/www.idge/js/article.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
0dbf4106e062b56a7d4db32cb448fad76e1aad0bf204b8569091bdcb5abed21e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
30534
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 2, 2
content-length
613
x-via-fastly
Verdad
x-served-by
cache-sjc3121-SJC, cache-sjc3121-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:18:02 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.206735,VS0,VE0
etag
W/"1707-1572981482000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:35:30 GMT
responsive-tables.js
www.computerworld.com/www.idge/js/jquery/
1 KB
771 B
Script
General
Full URL
https://www.computerworld.com/www.idge/js/jquery/responsive-tables.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
a739dbffc4a907c1f133b4b26e0daf544ea743218bba5704a910313b0ef3ac10

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
427885
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 2, 2
content-length
541
x-via-fastly
Verdad
x-served-by
cache-sjc3143-SJC, cache-sjc3143-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Thu, 31 Oct 2019 18:18:58 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.207196,VS0,VE0
etag
W/"1363-1572545938000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Fri, 08 Nov 2019 05:12:31 GMT
jquery.tablesorter.min.js
www.computerworld.com/www.idge/js/jquery/
16 KB
5 KB
Script
General
Full URL
https://www.computerworld.com/www.idge/js/jquery/jquery.tablesorter.min.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
55e8d16bb1a291b0524928dd3bd20c191a14d8a947e4b141271f9c595c7bb451

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
510411
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
5, 5, 1, 1
content-length
4798
x-via-fastly
Verdad
x-served-by
cache-sjc3129-SJC, cache-sjc3129-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:38 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.207161,VS0,VE0
etag
W/"16373-1572467678000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 06:17:13 GMT
global.js
www.computerworld.com/www.idge/js/
9 KB
3 KB
Script
General
Full URL
https://www.computerworld.com/www.idge/js/global.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
dbb8ab3fce681d38bdad241e1a075f677816ef4c3862e73236e5e414ea8e3c23

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
30629
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 1, 1
content-length
2538
x-via-fastly
Verdad
x-served-by
cache-sjc3138-SJC, cache-sjc3138-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:17:52 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.207145,VS0,VE0
etag
W/"9012-1572981472000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:33:10 GMT
ss-social.js
www.computerworld.com/www/js/webfonts/
4 KB
2 KB
Script
General
Full URL
https://www.computerworld.com/www/js/webfonts/ss-social.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
af34f58ea2fc346a5f7028ad8b721a9bb31405cf283471a37dab53bad10a6a36

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
514163
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 5, 5
content-length
1766
x-via-fastly
Verdad
x-served-by
cache-sjc3126-SJC, cache-sjc3126-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:08 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.207125,VS0,VE0
etag
W/"3950-1572467648000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 05:14:54 GMT
ss-standard.js
www.computerworld.com/www/js/webfonts/
11 KB
4 KB
Script
General
Full URL
https://www.computerworld.com/www/js/webfonts/ss-standard.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
bdfe5b167ff906b96e1f8f028ac8f5e41af7a1892d0cc3a275d28057ba79c0a9

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
514600
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 4, 4
content-length
3898
x-via-fastly
Verdad
x-served-by
cache-sjc3126-SJC, cache-sjc3126-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:08 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.207098,VS0,VE0
etag
W/"10818-1572467648000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 05:07:51 GMT
brandAnalytics.js
www.computerworld.com/www/js/analytics/
2 KB
700 B
Script
General
Full URL
https://www.computerworld.com/www/js/analytics/brandAnalytics.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
9844fb443bd322af1d908116fa890abdbed6b8b6fe73fba91c9beb8408318aad

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
520111
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
3, 3, 5, 5
content-length
461
x-via-fastly
Verdad
x-served-by
cache-sjc3137-SJC, cache-sjc3137-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:04 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.207074,VS0,VE0
etag
W/"2516-1572467644000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 03:35:38 GMT
locales-editions-slug.js
www.computerworld.com/www/js/
2 KB
778 B
Script
General
Full URL
https://www.computerworld.com/www/js/locales-editions-slug.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
cb46ebb59cbf4a04d2b1a4823cf4ffe7542f616496730377d0ceb5232dc4c385

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
30629
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 1, 1
content-length
569
x-via-fastly
Verdad
x-served-by
cache-sjc3142-SJC, cache-sjc3142-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Tue, 05 Nov 2019 19:17:30 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.207056,VS0,VE8
etag
W/"2186-1572981450000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:33:10 GMT
jquery.lazyload-ad.js
www.computerworld.com/www/js/ads/
10 KB
3 KB
Script
General
Full URL
https://www.computerworld.com/www/js/ads/jquery.lazyload-ad.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
4e6b5fc328bac95eec2e30afa8a58224c9accc6d70daf0e864d75c4c6d07fe94

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
509465
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 1, 1
content-length
3090
x-via-fastly
Verdad
x-served-by
cache-sjc3139-SJC, cache-sjc3139-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:02 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.207087,VS0,VE0
etag
W/"9912-1572467642000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 06:32:55 GMT
liveRamp.js
www.computerworld.com/www/js/utils/
913 B
700 B
Script
General
Full URL
https://www.computerworld.com/www/js/utils/liveRamp.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
7cffadca178c2346f349b255fe288be601a4890e3bde39f23a60d1f33c5386fe

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
516914
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
7, 7, 6, 6
content-length
469
x-via-fastly
Verdad
x-served-by
cache-sjc3130-SJC, cache-sjc3130-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:20 GMT
server
Apache-Coyote/1.1
x-timer
S1573020490.207066,VS0,VE0
etag
W/"913-1572467660000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 04:27:57 GMT
gtm.js
www.googletagmanager.com/
120 KB
34 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-WBVXW9&l=dataLayer
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WR6LD2P
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
2b100bc0267485a7758fb2431d47b8542bb2154187f03a30a487d8311edfabaa
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
br
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
34846
x-xss-protection
0
expires
Wed, 06 Nov 2019 06:08:10 GMT
api.js
w.soundcloud.com/player/
5 KB
3 KB
Script
General
Full URL
https://w.soundcloud.com/player/api.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WR6LD2P
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.60 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-60.fra2.r.cloudfront.net
Software
am/2 /
Resource Hash
78d83d68ccf7a24aca085486bfc291760424279b6f5308092af4fe600b9d1e19
Security Headers
Name Value
Strict-Transport-Security max-age=2592000

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:05:13 GMT
Via
sssr, 1.1 0e75d8f2d484ce463fc04f5c422aa179.cloudfront.net (CloudFront)
Age
93
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
P3P
policyref="https://w.soundcloud.com/player/w3c/p3p.xml", CP="NON DSP COR CUR ADM DEV TAI PSAo PSDo OUR STP CNT"
Connection
keep-alive
Content-Encoding
gzip
Last-Modified
Wed, 30 Oct 2019 12:47:54 GMT
Server
am/2
ETag
W/"1298-3484513282"
Strict-Transport-Security
max-age=2592000
Content-Type
application/javascript
Cache-Control
public, max-age=300
X-Amz-Cf-Pop
FRA2-C1
Accept-Ranges
bytes
X-Amz-Cf-Id
GTIkczCYzoCrVHtHzpd0ZUH3fTM-2ptnqsCAJ41BiFhh9RonRr9Saw==
l
use.typekit.net/af/c63dde/0000000000000000000170a8/27/
17 KB
17 KB
Font
General
Full URL
https://use.typekit.net/af/c63dde/0000000000000000000170a8/27/l?primer=7fa3915bdafdf03041871920a205bef951d72bf64dd4c4460fb992e3ecc3a862&fvd=n7&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
79bfd94ffb887bea6339173839d658d3871e15846c317ca2a5d092615fa85f09

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
server
nginx
etag
"c8055f06a1c5ad6765f4692c80f455f34fc24e0a"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
17340
cse_element__en.js
www.google.com/cse/static/element/b5752d27691147d6/
256 KB
85 KB
Script
General
Full URL
https://www.google.com/cse/static/element/b5752d27691147d6/cse_element__en.js?usqp=CAI%3D
Requested by
Host: cse.google.com
URL: https://cse.google.com/cse.js?cx=011881588825642368632:cnkmmv0dvim
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f50798458e958d44022e68ed50eaf58ee47256a163f3022681fe1c899139d612
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 04:39:48 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 20 Sep 2019 16:22:21 GMT
server
sffe
age
5302
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
86564
x-xss-protection
0
expires
Thu, 05 Nov 2020 04:39:48 GMT
default+en.css
www.google.com/cse/static/element/b5752d27691147d6/
40 KB
9 KB
Stylesheet
General
Full URL
https://www.google.com/cse/static/element/b5752d27691147d6/default+en.css
Requested by
Host: cse.google.com
URL: https://cse.google.com/cse.js?cx=011881588825642368632:cnkmmv0dvim
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
40a20291f9b526cba58796a4bbd0256d5663313e02c9d5ab5a842476562b3108
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 04:39:48 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 20 Sep 2019 16:22:21 GMT
server
sffe
age
5302
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
9042
x-xss-protection
0
expires
Thu, 05 Nov 2020 04:39:48 GMT
default.css
www.google.com/cse/static/style/look/v3/
12 KB
3 KB
Stylesheet
General
Full URL
https://www.google.com/cse/static/style/look/v3/default.css
Requested by
Host: cse.google.com
URL: https://cse.google.com/cse.js?cx=011881588825642368632:cnkmmv0dvim
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8c5519ff6e93dfefc21c8b9c586ceef2060b2161e6be946d5b704341456ef053
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 05:25:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 07 May 2019 14:00:00 GMT
server
sffe
age
2589
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2805
x-xss-protection
0
expires
Wed, 06 Nov 2019 06:15:01 GMT
pub
pixel.adsafeprotected.com/services/
910 B
1 KB
XHR
General
Full URL
https://pixel.adsafeprotected.com/services/pub?anId=8879&slot=%7Bid:gpt-skin,ss:%5B1.1%5D,p:/8456/IDG.G_B2B_Computerworld.com/security_section,t:display%7D&slot=%7Bid:inread,ss:%5B1.1,2.1%5D,p:/8456/IDG.G_B2B_Computerworld.com/security_section,t:display%7D&slot=%7Bid:gpt-overlay,ss:%5B640.480%5D,p:/8456/IDG.G_B2B_Computerworld.com/security_section,t:display%7D&slot=%7Bid:topleaderboard,ss:%5B970.90,970.250,728.90%5D,p:/8456/IDG.G_B2B_Computerworld.com/security_section,t:display%7D&slot=%7Bid:topimu,ss:%5B300.600,300.250,120.600,160.600%5D,p:/8456/IDG.G_B2B_Computerworld.com/security_section,t:display%7D&slot=%7Bid:oc_ad_1,ss:%5B7.7%5D,p:/8456/IDG.G_B2B_Computerworld.com/security_section,t:display%7D&wr=1600.1200&sr=1600.1200&sessionId=1da8e45a-8a09-e4c9-e057-e3f943b99c72&url=https%253A%252F%252Fwww.computerworld.com%252Farticle%252F3451956%252Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%253Futm_source%253DAdestra%2526utm_medium%253Demail%2526utm_content%253DDescription%25253A%252520Why%252520India%2525E2%252580%252599s%252520data%252520protection%252520law%252520needs%252520to%252520avoid%252520the%252520perfection%252520loophole%2526utm_campaign%253DThe%252520Daily%252520Byte%2526utm_term%253DThe%252520Daily%252520Byte%2526utm_date%253D20191106060809
Requested by
Host: cdn.adsafeprotected.com
URL: https://cdn.adsafeprotected.com/iasPET.1.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.166.0.26 , United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
anycast.pixel.adsafeprotected.com
Software
nginx /
Resource Hash
a8f081457e1b96cbbb395efc1b7b6a278994c87b6cb149d701132266300e9860

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:10 GMT
X-Server-Name
app01ami.ami.303net.pvt
Transfer-Encoding
chunked
Content-Type
application/json;charset=UTF-8
Access-Control-Allow-Origin
https://www.computerworld.com
Access-Control-Expose-Headers
X-Server-Name
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
Server
nginx
l
use.typekit.net/af/a28b50/00000000000000000000e803/27/
14 KB
14 KB
Font
General
Full URL
https://use.typekit.net/af/a28b50/00000000000000000000e803/27/l?primer=7fa3915bdafdf03041871920a205bef951d72bf64dd4c4460fb992e3ecc3a862&fvd=n5&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
3c84f7dd73aac7155657f8c2a339eec0c00086be3bce750eb44957b909e2f8c9

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
server
nginx
etag
"08a387c1b34867ee4ed26dfa892c9f802a1b7ae3"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
14300
why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html
www.computerworld.com/article/3451956/
Redirect Chain
  • https://www.computerworld.com/article/3451956/
  • https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html
64 KB
64 KB
Image
General
Full URL
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
1916
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
38651
x-via-fastly
Verdad
x-served-by
cache-sjc3129-SJC, cache-sjc3129-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
server
Apache-Coyote/1.1
x-timer
S1573020490.498988,VS0,VE1
vary
Accept-Encoding,Cookie
content-type
text/html;charset=UTF-8
via
1.1 varnish, 1.1 varnish
x-vcl-version
92
accept-ranges
bytes
x-cache-hits
1, 1, 1, 1

Redirect headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
1916
x-cache
MISS, MISS, HIT, HIT
status
301
content-length
25
x-via-fastly
Verdad
x-served-by
cache-sjc3136-SJC, cache-sjc3136-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
server
Apache-Coyote/1.1
x-timer
S1573020490.462179,VS0,VE0
location
/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html
vary
Accept-Encoding,Cookie
via
1.1 varnish, 1.1 varnish
x-vcl-version
92
accept-ranges
bytes
x-cache-hits
0, 0, 1, 1
5ba5e406e33cb603e01b1be0_close-icon.svg
uploads-ssl.webflow.com/57d30b6aa1924bb30d7ae290/
2 KB
1 KB
Image
General
Full URL
https://uploads-ssl.webflow.com/57d30b6aa1924bb30d7ae290/5ba5e406e33cb603e01b1be0_close-icon.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/messaging.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.11 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-11.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
2ab172d1a6dab39d0b8efd61404468129ea0c23eaee414669b69276064dd3c11

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Fri, 12 Jul 2019 20:30:46 GMT
content-encoding
gzip
last-modified
Sat, 22 Sep 2018 06:41:11 GMT
server
AmazonS3
age
10057045
vary
Accept-Encoding
x-cache
Hit from cloudfront
x-amz-version-id
YCr6y.ejPXZjFF6Y_IHXAbhJqsw3Y8no
status
200
cache-control
max-age=31536000, must-revalidate
x-amz-cf-pop
FRA2-C2
content-type
image/svg+xml
x-amz-cf-id
lFt8rk7f2qYTPee4kXIRyCLwz3PU33nbxL0CbZIGiWiJg6Ie4MrAKQ==
via
1.1 debe291145dc27044f50d04bac101cd9.cloudfront.net (CloudFront)
computerworld-black-100800410-orig.jpg
images.idgesg.net/images/article/2019/06/
13 KB
14 KB
Image
General
Full URL
https://images.idgesg.net/images/article/2019/06/computerworld-black-100800410-orig.jpg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
9166c84f283f1438e86f3f6a8b200fc476c9f7eb02ffb653941c72a958b65ce7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
C1DljYcgmNZwTIaMO2.8uJKaK5jGSoi0
via
1.1 varnish, 1.1 varnish
etag
"88ea1a1fc7629b7df8d03ad92f051307"
age
127390
x-cache
HIT, HIT
status
200
content-length
13593
x-amz-id-2
iR7pBDwkbO+P5f7GzvatRFfP9yE1gUjPCBGVqZvuLpabtEE5PCC0dLXw7ggrZ76AkQMz54FCe08=
x-served-by
cache-jfk8136-JFK, cache-fra19153-FRA
last-modified
Wed, 26 Jun 2019 19:20:26 GMT
server
AmazonS3
x-timer
S1573020490.465052,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:10 GMT
x-amz-request-id
0BC6E7B5290D1506
cache-control
public, max-age=2592000
accept-ranges
bytes
content-type
image/jpeg
x-cache-hits
1, 1
17af3e0389d4bd4dd313d09c98f1136b
idg.blueconic.net/plugin/plugin/
96 KB
24 KB
Script
General
Full URL
https://idg.blueconic.net/plugin/plugin/17af3e0389d4bd4dd313d09c98f1136b
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.20.228.30 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-20-228-30.compute-1.amazonaws.com
Software
- /
Resource Hash
8e369f667a6fb482f534daa45bc449e8a2a27a19ddddff61fbcbdb62e0bb69cd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
-
etag
17af3e0389d4bd4dd313d09c98f1136b
x-robots-tag
noindex, nofollow
p3p
policyref="", CP="DSP"
status
200
x-permitted-cross-domain-policies
master-only
cache-control
private, max-age=31536000
content-type
text/javascript; charset=utf-8
content-length
24021
x-xss-protection
1; mode=block
expires
Thu, 05 Nov 2020 06:08:10 GMT
l
use.typekit.net/af/9cf49e/00000000000000000000e807/27/
14 KB
14 KB
Font
General
Full URL
https://use.typekit.net/af/9cf49e/00000000000000000000e807/27/l?primer=7fa3915bdafdf03041871920a205bef951d72bf64dd4c4460fb992e3ecc3a862&fvd=n9&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
a4b7036faf76b31b0d0b07feee947f5fe32862bfbd7eaaf3a9a1d6b407473e36

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
server
nginx
etag
"5d1fa2ea6ee080393fd984e89c201f5030ee920e"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
14196
l
use.typekit.net/af/c2d3de/00000000000000000000e804/27/
14 KB
15 KB
Font
General
Full URL
https://use.typekit.net/af/c2d3de/00000000000000000000e804/27/l?primer=7fa3915bdafdf03041871920a205bef951d72bf64dd4c4460fb992e3ecc3a862&fvd=i5&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
5939294f7d1b8f9bd2173f4142059bcce68132be8c1dfdf20f58915ae70dfc90

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
server
nginx
etag
"a8d9d2919b68b19824491cd15a30bea46b0aa79d"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
14760
l
use.typekit.net/af/d32e26/00000000000000000001709b/27/
46 KB
46 KB
Font
General
Full URL
https://use.typekit.net/af/d32e26/00000000000000000001709b/27/l?primer=fff1a989570eb474b8c22c57cc7199e63bfc7e911b750165d0199218f0b7e7cc&fvd=i4&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ce8e1e18384d0b92e0ac0aa8dbad77fd115a1fb1d335e4f92f19db3c27ca7ec0

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
server
nginx
etag
"170b86fe9770e5f0e798d2af7d0d386e5de068e6"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
47040
bg-topstories.png
idge.staticworld.net/ctw/
2 KB
2 KB
Image
General
Full URL
https://idge.staticworld.net/ctw/bg-topstories.png
Requested by
Host: s.ntv.io
URL: https://s.ntv.io/serve/load.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
05a563039fb544dcfbb030ab912b69d02e57590f95d950c22b1544d4d94aa1be

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/www.idge.ctw/css/article.css?v=20191105111835
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
DH_jNIo83ZoLGDTO0qaKogYARCQPQxoP
via
1.1 varnish, 1.1 varnish
etag
"0f923f2a6910f2e31c9217a18a5c5e34"
age
265867
x-cache
HIT, HIT
status
200
content-length
2265
x-amz-id-2
Z+yogu4pWVLfVIJXQ4b0+aRDU8miCehEaT7Kr7ed8J5b3YHi8QVvGfm336ka6LexgDymT3GDh+c=
x-served-by
cache-jfk8138-JFK, cache-fra19153-FRA
last-modified
Tue, 27 Mar 2018 00:09:10 GMT
server
AmazonS3
x-timer
S1573020491.530232,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:10 GMT
x-amz-request-id
11094596E57A9102
cache-control
public, max-age=2592000
accept-ranges
bytes
content-type
image/png
x-cache-hits
1, 3
l
use.typekit.net/af/2841b6/00000000000000000000e806/27/
14 KB
15 KB
Font
General
Full URL
https://use.typekit.net/af/2841b6/00000000000000000000e806/27/l?primer=7fa3915bdafdf03041871920a205bef951d72bf64dd4c4460fb992e3ecc3a862&fvd=i7&v=3
Requested by
Host: s.ntv.io
URL: https://s.ntv.io/serve/load.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
5a3f64319878922fc6e280ed38e952f43afd195a8aa254e04d8911a03005e1cc

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
server
nginx
etag
"b00409cc89050d270de5f09dd609a8aae360c3fa"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
14832
BBE7D5879ED54989BCFE7FEECB429583.png
ntvcld-a.akamaihd.net/image/upload/w_640,h_360,c_fill,g_auto:text,f_auto,fl_lossy,e_sharpen:70/assets/
73 KB
73 KB
Image
General
Full URL
https://ntvcld-a.akamaihd.net/image/upload/w_640,h_360,c_fill,g_auto:text,f_auto,fl_lossy,e_sharpen:70/assets/BBE7D5879ED54989BCFE7FEECB429583.png
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.16.186.51 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-51.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
7cfa3627469070e6a34d50740821ef86dbe6b9b8d293cfdebabddd33bf508afe

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:10 GMT
Status
200 OK
Content-Disposition
inline; filename="BBE7D5879ED54989BCFE7FEECB429583.webp"
Connection
keep-alive
Content-Length
74258
X-Request-Id
f883665b1ec0803d5719b647d67096f0
X-Served-By
cache-iad2143-IAD
Last-Modified
Tue, 05 Nov 2019 17:42:19 GMT
X-Timer
S1572987178.387636,VS0,VE1
ETag
"b402bd7006641e5cc8d80246032717ce"
Content-Type
image/webp
Access-Control-Allow-Origin
*
Expires
Wed, 04 Nov 2020 20:52:11 GMT
Cache-Control
public, private, max-age=31502641
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Cache-Hits
1
trk.gif
jadserve.postrelease.com/
43 B
339 B
Image
General
Full URL
https://jadserve.postrelease.com/trk.gif?ntv_at=46,302&ntv_ui=4af2610f-acb0-4cea-81cb-1310be0ff989&ntv_a=X2wFAXDE-AXe4LA&ntv_fl=Js-9sgkIMAcneH5bOKp6X9uWqFUFyflRK83NhSSTeR4=&ord=520536346&ntv_ht=SmPCXQA&ntv_tad=16&ntv_az=g5GmcIORpnCDkaZw&ntv_al=yeIWk8niFpI=&ntv_ak=ngpVpd5TVaWeClWl&ntv_it
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.100.212 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-231-100-212.compute-1.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 06:08:10 GMT
server
nginx/1.12.1
status
200
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
image/gif
content-length
43
expires
Mon, 1 Jan 1990 12:00:00 GMT
93486DB8DCD046258D9E15FD705FDAB1.png
ntvcld-a.akamaihd.net/image/upload/w_640,h_360,c_fill,g_auto:text,f_auto,fl_lossy,e_sharpen:70/assets/
29 KB
29 KB
Image
General
Full URL
https://ntvcld-a.akamaihd.net/image/upload/w_640,h_360,c_fill,g_auto:text,f_auto,fl_lossy,e_sharpen:70/assets/93486DB8DCD046258D9E15FD705FDAB1.png
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.16.186.51 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-51.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ffa56467fa17a00d457cfce642e17b5af9b2503dee21e1add5068ec7f9ab70dd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:10 GMT
Status
200 OK
Content-Disposition
inline; filename="93486DB8DCD046258D9E15FD705FDAB1.webp"
Connection
keep-alive
Content-Length
29190
X-Request-Id
b7234f4d67256532405269924d069c09
X-Served-By
cache-iad2128-IAD
Last-Modified
Tue, 05 Nov 2019 17:37:35 GMT
X-Timer
S1572980642.564108,VS0,VE1
ETag
"ad01923b985720df2d33e348116e77c6"
Content-Type
image/webp
Access-Control-Allow-Origin
*
Expires
Wed, 04 Nov 2020 19:04:55 GMT
Cache-Control
public, private, max-age=31496205
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Cache-Hits
1
trk.gif
jadserve.postrelease.com/
43 B
339 B
Image
General
Full URL
https://jadserve.postrelease.com/trk.gif?ntv_at=46&ntv_ui=4d1a71e7-6b12-4683-b025-93c98e58ac40&ntv_a=W2wFAWDE-A7ngQA&ntv_fl=Js-9sgkIMAcneH5bOKp6X9uWqFUFyflRK83NhSSTeR4=&ord=439837589&ntv_ht=SmPCXQA&ntv_tad=16&ntv_az=DvcZqw73GasO9xmr&ntv_al=3w6pKt8OqSs=&ntv_ak=DJoxpkzDMaYMmjGm&ntv_it
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.100.212 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-231-100-212.compute-1.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 06:08:10 GMT
server
nginx/1.12.1
status
200
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
image/gif
content-length
43
expires
Mon, 1 Jan 1990 12:00:00 GMT
trk.gif
jadserve.postrelease.com/
43 B
339 B
Image
General
Full URL
https://jadserve.postrelease.com/trk.gif?ntv_at=46&ntv_ui=dd0d3b70-42e6-4ee0-a3e7-1b8b409f99a6&ntv_a=XGwFAWTE-AeeoQA&ntv_fl=Js-9sgkIMAcneH5bOKp6X9uWqFUFyflRK83NhSSTeR4=&ord=-1896790890&ntv_ht=SmPCXQA&ntv_tad=16&ntv_az=9PPBsPTzwbD088Gw&ntv_al=Vk37v1ZN-74=&ntv_ak=CUCHqUkZh6kJQIep&ntv_it
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.231.100.212 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-231-100-212.compute-1.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 06:08:10 GMT
server
nginx/1.12.1
status
200
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
image/gif
content-length
43
expires
Mon, 1 Jan 1990 12:00:00 GMT
pub.531979.min.js
www.dwin2.com/
215 KB
80 KB
Script
General
Full URL
https://www.dwin2.com/pub.531979.min.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WBVXW9&l=dataLayer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.110 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
8ec68006e61bdb9b3e39c7aa39da4c6964dbfd06be4fcc5be28e7981eb20353d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
4980
x-cache
HIT, HIT
status
200
x-cache-hits
3, 7
content-length
81755
x-served-by
cache-lcy19222-LCY, cache-fra19121-FRA
last-modified
Tue, 05 Nov 2019 22:22:34 GMT
server
nginx
x-timer
S1573020491.558689,VS0,VE0
etag
"5dc1f62a-35d92"
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=3600
accept-ranges
bytes
expires
Wed, 06 Nov 2019 05:45:09 GMT
rid
match.adsrvr.org/track/
109 B
542 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=183980
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183980-32335169869501.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.79.134 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-79-134.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
dfe664c1500d8a377c39abdce4504cde84e58472488a75b7fe262d1039f781ed

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Fri, 06 Dec 2019 06:08:10 GMT
identity
api.rlcdn.com/api/
0
0

outbrain.js
widgets.outbrain.com/
107 KB
37 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js?_=1573020489762
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
c51502424feb25b180397c31bc508446432626d2d73e1f26e16ef6d1cb057a79

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:10 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"b61b6de8fb2800efc37236ccad6fc298:1572966155"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=14400
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
37198
computerworld_logo-final.svg
idge.staticworld.net/ctw/
3 KB
4 KB
Image
General
Full URL
https://idge.staticworld.net/ctw/computerworld_logo-final.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
aabfa6620524db406cff6f8d40382ab112770a3dc7494435ee177c89c348f3ce

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/www.idge.ctw/css/foot.css?v=20191105111835
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
EtzZQ7cT2kqC_LGpeC1y.BPw9rdJBYgO
via
1.1 varnish, 1.1 varnish
etag
"c5911f9888bb0247426b88e12714ded0"
age
2491
x-cache
HIT, HIT
status
200
content-length
3536
x-amz-id-2
W6Cq/VsbAtEmSVfGNPqy0ZkW9CWAeXW24TG/WDfzosG3HaU3npH8AbtimyQNYRfRvySlZ0zhEx8=
x-served-by
cache-jfk8148-JFK, cache-fra19153-FRA
last-modified
Tue, 27 Mar 2018 00:09:11 GMT
server
AmazonS3
x-timer
S1573020491.589248,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:10 GMT
x-amz-request-id
2E55DEBD644B3EB8
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
1, 1
9694aa882dd83090c8baff998ebb5b60
idg.blueconic.net/plugin/library/
300 KB
87 KB
Script
General
Full URL
https://idg.blueconic.net/plugin/library/9694aa882dd83090c8baff998ebb5b60
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.20.228.30 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-20-228-30.compute-1.amazonaws.com
Software
- /
Resource Hash
0e04f98869d913dfdf71cc20a47560877bdc61b50e568f277dc526a9fd543ec2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
-
etag
9694aa882dd83090c8baff998ebb5b60
x-robots-tag
noindex, nofollow
p3p
policyref="", CP="DSP"
status
200
x-permitted-cross-domain-policies
master-only
cache-control
private, max-age=31536000
content-type
text/javascript; charset=utf-8
content-length
88868
x-xss-protection
1; mode=block
expires
Thu, 05 Nov 2020 06:08:10 GMT
LB-Zone-1
idg.blueconic.net/DG/DEFAULT/rest/rpc/json/
2 KB
1 KB
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json/LB-Zone-1?referer=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&bcsessionid=&bctempid=44daf071-47ab-4918-844e-c2140f7cb661&overruleReferrer=&time=2019-11-06T07%3A08%3A10%2B01%3A00&ts=1573020490603
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.20.228.30 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-20-228-30.compute-1.amazonaws.com
Software
- /
Resource Hash
b5f8e7a32a05ebdb2d5a642a69e485a9a146df09bad2b8027cfb70b288a199c2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
920
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
init.js
www.dwin2.com/
207 B
397 B
Script
General
Full URL
https://www.dwin2.com/init.js?t=1573020490605
Requested by
Host: www.dwin2.com
URL: https://www.dwin2.com/pub.531979.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.110 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
80f704b79cf24198800e41c953686959a85a0030f3fe7e6eee0669d30a3ca47c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
3591
x-cache
HIT, HIT
status
200
x-cache-hits
49, 139
content-length
187
x-served-by
cache-lcy19235-LCY, cache-fra19121-FRA
last-modified
Tue, 05 Nov 2019 22:03:22 GMT
server
nginx
x-timer
S1573020491.609227,VS0,VE0
etag
"5dc1f1aa-cf"
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=3600
accept-ranges
bytes
expires
Tue, 05 Nov 2019 23:42:25 GMT
l
use.typekit.net/af/f72c04/0000000000000000000170a4/27/
17 KB
17 KB
Font
General
Full URL
https://use.typekit.net/af/f72c04/0000000000000000000170a4/27/l?primer=7fa3915bdafdf03041871920a205bef951d72bf64dd4c4460fb992e3ecc3a862&fvd=n4&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
234ef0c4a4fa49aab610ad8ed65780f697fff23ae133f3d3be53a89852bb804d

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
server
nginx
etag
"7519e81365bf63f5192f0c9b87ad82ce943ffc0c"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
17692
tso
www.computerworld.com/ads/
3 KB
1 KB
XHR
General
Full URL
https://www.computerworld.com/ads/tso?localeId=0
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
0fe34e87429f26b64f5b060e82d98f0e98940f29f89887a898a0c0f22c06d672

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
vary
Accept-Encoding,Cookie
age
18414
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
1041
x-via-fastly
Verdad
x-served-by
cache-sjc3151-SJC, cache-sjc3151-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
server
Apache-Coyote/1.1
x-timer
S1573020491.653355,VS0,VE0
x-fastly-ttl
14400.000
content-type
application/json;charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
max-age=14400
x-vcl-version
92
accept-ranges
bytes
x-fastly-stale
432000.000
x-cache-hits
122, 122, 2, 2
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:10 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Thu, 07 Nov 2019 06:08:10 GMT
d3d3LmNvbXB1dGVyd29ybGQuY29t
tcheck.outbrainimg.com/tcheck/check/
16 B
477 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/d3d3LmNvbXB1dGVyd29ybGQuY29t
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573020489762
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.70.82 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-70-82.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
ETag
W/"10-us8lSJutAxKqLzf8c1+n5XstcwY"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=10464
Date
Wed, 06 Nov 2019 06:08:10 GMT
Connection
keep-alive
Access-Control-Allow-Credentials
false
Content-Length
16
Expires
Wed, 06 Nov 2019 09:02:34 GMT
tile
www.computerworld.com/napi/
993 B
537 B
XHR
General
Full URL
https://www.computerworld.com/napi/tile?def=blox4.dynamic&geo=0&definition=nav.fixed&placement=Nav+Fixed
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
5c66544d9432198f8c71a5a900c3ea6e8c353e5a2075040d9a7fc4f2ad3d1a34

Request headers

Accept
text/html, */*; q=0.01
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
vary
Accept-Encoding,Cookie
age
10962
x-cache
HIT, HIT, MISS, MISS
status
200
content-length
327
x-via-fastly
Verdad
x-served-by
cache-sjc3126-SJC, cache-sjc3126-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
server
Apache-Coyote/1.1
x-timer
S1573020491.675147,VS0,VE145
x-fastly-ttl
14400.000
content-type
text/html;charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
max-age=14400
x-vcl-version
92
accept-ranges
bytes, bytes
x-fastly-stale
432000.000
x-cache-hits
153, 153, 0, 0
tile
www.computerworld.com/napi/
2 KB
742 B
XHR
General
Full URL
https://www.computerworld.com/napi/tile?def=blox4.dynamic&geo=0&placement=Nav+Mega+Column+1
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
9377baf5154b69c1582f23a968229039e2f1be17e28e65d0b247a6c337cf755e

Request headers

Accept
text/html, */*; q=0.01
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
vary
Accept-Encoding,Cookie
age
11230, 11230
x-cache
HIT, HIT, MISS, MISS
status
200
content-length
531
x-via-fastly
Verdad
x-served-by
cache-sjc3145-SJC, cache-sjc3145-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
server
Apache-Coyote/1.1
x-timer
S1573020491.675930,VS0,VE153
x-fastly-ttl
14400.000
content-type
text/html;charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
max-age=14400
x-vcl-version
92
accept-ranges
bytes, bytes, bytes
x-fastly-stale
432000.000
x-cache-hits
143, 143, 0, 0
tile
www.computerworld.com/napi/
2 KB
677 B
XHR
General
Full URL
https://www.computerworld.com/napi/tile?def=blox4.dynamic&geo=0&placement=Nav+Mega+Column+2
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
90e0666da610154ef69cfbc9943e67d390adecb3cfe2ddbf9be8b1c250dc06a8

Request headers

Accept
text/html, */*; q=0.01
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
vary
Accept-Encoding,Cookie
age
11173
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
498
x-via-fastly
Verdad
x-served-by
cache-sjc3120-SJC, cache-sjc3120-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
server
Apache-Coyote/1.1
x-timer
S1573020491.676696,VS0,VE0
x-fastly-ttl
14400.000
content-type
text/html;charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
max-age=14400
x-vcl-version
92
accept-ranges
bytes
x-fastly-stale
432000.000
x-cache-hits
55, 55, 1, 1
tile
www.computerworld.com/napi/
240 B
258 B
XHR
General
Full URL
https://www.computerworld.com/napi/tile?def=blox4.dynamic&geo=0&placement=Nav+Mega+Column+3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
80bc122106fbc20338532a342b11cd70c8ab2809b6db25abe91c63179a949e31

Request headers

Accept
text/html, */*; q=0.01
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
vary
Accept-Encoding,Cookie
age
11118
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
88
x-via-fastly
Verdad
x-served-by
cache-sjc3139-SJC, cache-sjc3139-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
server
Apache-Coyote/1.1
x-timer
S1573020491.677669,VS0,VE0
x-fastly-ttl
14400.000
content-type
text/html;charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
max-age=14400
x-vcl-version
92
accept-ranges
bytes
x-fastly-stale
432000.000
x-cache-hits
49, 49, 2, 2
tile
www.computerworld.com/napi/
6 KB
1 KB
XHR
General
Full URL
https://www.computerworld.com/napi/tile?def=blox4.dynamic&geo=0&placement=Nav+Mega+Column+4
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f7a2f590dcecf23cc799a4d24e6010c5bb0e9708ab2368a57578a257887ef950

Request headers

Accept
text/html, */*; q=0.01
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
vary
Accept-Encoding,Cookie
age
11032
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
1180
x-via-fastly
Verdad
x-served-by
cache-sjc3120-SJC, cache-sjc3120-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
server
Apache-Coyote/1.1
x-timer
S1573020491.678780,VS0,VE0
x-fastly-ttl
14400.000
content-type
text/html;charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
max-age=14400
x-vcl-version
92
accept-ranges
bytes
x-fastly-stale
432000.000
x-cache-hits
45, 45, 2, 2
tile
www.computerworld.com/napi/
116 B
186 B
XHR
General
Full URL
https://www.computerworld.com/napi/tile?def=listItemList&genericIfCategoryEmpty=true&includeArticles=true&pageSize=4&queryKey=BestTechDeals&typeId=16&wrapperElement=ul&itemTemplate=%2Fwww.idge%2F_shared%2Fcomponents%2Fmodules%2Fitem%2Frelated-articles.jsp
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
c1145767f4465c4414b2e93324a70029c6b40f195a2667c5baf8821a5005cc4d

Request headers

Accept
*/*
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
vary
Accept-Encoding,Cookie
age
16840
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
31
x-via-fastly
Verdad
x-served-by
cache-sjc3143-SJC, cache-sjc3143-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
server
Apache-Coyote/1.1
x-timer
S1573020491.686223,VS0,VE0
x-fastly-ttl
14400.000
content-type
text/html;charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
max-age=14400
x-vcl-version
92
accept-ranges
bytes
x-fastly-stale
432000.000
x-cache-hits
20, 20, 1, 1
tile
www.computerworld.com/napi/
4 KB
832 B
XHR
General
Full URL
https://www.computerworld.com/napi/tile?def=listItemList&genericIfCategoryEmpty=true&includeArticles=true&pageSize=4&queryKey=TechconnectDeals&brandOwnerOnly=true&brandOwner=4194304&wrapperElement=ul&itemTemplate=%2Fwww.idge%2F_shared%2Fcomponents%2Fmodules%2Fitem%2Frelated-articles.jsp
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
c50eb9228056c580ce24a5deeb621190877cd4369c70e8ff191aeb3f9148e3e1

Request headers

Accept
*/*
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
vary
Accept-Encoding,Cookie
age
2534
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
706
x-via-fastly
Verdad
x-served-by
cache-sjc3120-SJC, cache-sjc3120-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
server
Apache-Coyote/1.1
x-timer
S1573020491.686297,VS0,VE0
x-fastly-ttl
14400.000
content-type
text/html;charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
max-age=14400
x-vcl-version
92
accept-ranges
bytes
x-fastly-stale
432000.000
x-cache-hits
1, 1, 1, 1
jquery.lazyload.min.js
www.computerworld.com/www/js/jquery/
3 KB
2 KB
XHR
General
Full URL
https://www.computerworld.com/www/js/jquery/jquery.lazyload.min.js?_=1573020489763
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
a193a57207a9fe3514d40f9f36426ce98dd4dfb8ec15277a9f3b9add4a09472f

Request headers

Accept
text/javascript, application/javascript, application/ecmascript, application/x-ecmascript, */*; q=0.01
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
508417
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
3, 3, 4, 4
content-length
1300
x-via-fastly
Verdad
x-served-by
cache-sjc3146-SJC, cache-sjc3146-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:14 GMT
server
Apache-Coyote/1.1
x-timer
S1573020491.688137,VS0,VE0
etag
W/"3396-1572467654000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 06:45:24 GMT
jquery.lazyload.min.js
www.computerworld.com/www/js/jquery/
3 KB
1 KB
XHR
General
Full URL
https://www.computerworld.com/www/js/jquery/jquery.lazyload.min.js?_=1573020489764
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
a193a57207a9fe3514d40f9f36426ce98dd4dfb8ec15277a9f3b9add4a09472f

Request headers

Accept
text/javascript, application/javascript, application/ecmascript, application/x-ecmascript, */*; q=0.01
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
508417
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
3, 3, 5, 5
content-length
1300
x-via-fastly
Verdad
x-served-by
cache-sjc3146-SJC, cache-sjc3146-SJC, cache-hhn4025-HHN, cache-hhn4025-HHN
last-modified
Wed, 30 Oct 2019 20:34:14 GMT
server
Apache-Coyote/1.1
x-timer
S1573020491.690451,VS0,VE0
etag
W/"3396-1572467654000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 06:45:24 GMT
async-ads.js
cse.google.com/adsense/search/
163 KB
57 KB
Script
General
Full URL
https://cse.google.com/adsense/search/async-ads.js
Requested by
Host: www.google.com
URL: https://www.google.com/cse/static/element/b5752d27691147d6/cse_element__en.js?usqp=CAI%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
dc4a3e53165c3cd4219e2f9cbfc7529417112df54ac858e63345576de6e3f853
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"12368575020318973086"
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
x-xss-protection
0
expires
Wed, 06 Nov 2019 06:08:10 GMT
icon-image-zoom.png
idge.staticworld.net/idge/
2 KB
2 KB
Image
General
Full URL
https://idge.staticworld.net/idge/icon-image-zoom.png
Requested by
Host: www.google.com
URL: https://www.google.com/cse/static/element/b5752d27691147d6/cse_element__en.js?usqp=CAI%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6bde799ee862bcc9d4296ecc2dafd95a1448d73efbde69849eb3709235f898fd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/www/css/article.css?v=20191105111835
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
tN8pHF9Hvh98woe6dmCenuQilhH7zVDX
via
1.1 varnish, 1.1 varnish
etag
"d3c79d98136025c6974915518ace3b17"
age
1658255
x-cache
HIT, HIT
status
200
content-length
1656
x-amz-id-2
9oy63QBRmbS4jrwWAKStiZypxx6xylNmFsI54r3y3HVZ21CjM6EEeVu5Xj78hZnk1+ruhomqfbA=
x-served-by
cache-jfk8148-JFK, cache-fra19153-FRA
last-modified
Tue, 27 Mar 2018 00:09:57 GMT
server
AmazonS3
x-timer
S1573020491.703069,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:10 GMT
x-amz-request-id
B521E3D6A20EFFC3
cache-control
public, max-age=2592000
accept-ranges
bytes
content-type
image/png
x-cache-hits
1, 19
googlelogo_grey_46x15dp.png
www.google.com/cse/static/images/1x/
919 B
990 B
Image
General
Full URL
https://www.google.com/cse/static/images/1x/googlelogo_grey_46x15dp.png
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
a844cdc48c7591822e45128a138f1dbba5753a3ca9992bd71c36758d51d0b68e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Fri, 01 Nov 2019 21:23:44 GMT
x-content-type-options
nosniff
last-modified
Tue, 13 Dec 2016 15:00:00 GMT
server
sffe
age
377066
content-type
image/png
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
919
x-xss-protection
0
expires
Sat, 31 Oct 2020 21:23:44 GMT
generate_204
clients1.google.com/
0
40 B
Image
General
Full URL
https://clients1.google.com/generate_204
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

status
204
date
Wed, 06 Nov 2019 06:08:10 GMT
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
l
use.typekit.net/af/e3ca36/00000000000000000000e805/27/
14 KB
14 KB
Font
General
Full URL
https://use.typekit.net/af/e3ca36/00000000000000000000e805/27/l?primer=7fa3915bdafdf03041871920a205bef951d72bf64dd4c4460fb992e3ecc3a862&fvd=n7&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
114edd54c074d906c568199ec4cd913f6f468eb46bbdc6925f2748d4602c3817

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
server
nginx
etag
"f04e66015b48bed6708639ded7923114ad09708a"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
14348
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1573020490704&sessionId=6afa146a-441f-48f8-6db0-73125c1e65d2&url=www.computerworld.com&cheqSource=1&cheqEvent=0&exitReason=2
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573020489762
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.31 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 06:08:11 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
9acb44f5123578a641e27b2dec73688c
Content-Length
4
Expires
0
CIO-logo-blk-wht-no-tag.svg
alt.idgesg.net/images/furniture/cio/
1 KB
2 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/cio/CIO-logo-blk-wht-no-tag.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f1b17f2f9534096425d6a28ed4a6c87f220b12a4b579c2936ab358e1da7de235

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
SWPVylTKhkXRLzcqckQyPzS2sW_WO6tj
via
1.1 varnish, 1.1 varnish
etag
"c164c10a34b9bb9602a3fa9fd11418f2"
age
5522
x-amz-meta-origin-date-iso8601
2019-10-30T17:26:32.000Z
x-cache
HIT, HIT
status
200
content-length
1326
x-amz-id-2
PWkhuBOP+QsvAncOutQlWV7YRZoSRpSKVyXp4TbfUR3jTCNFgZx3kuKJzMqecoc9SCQUYYRInJ8=
x-served-by
cache-jfk8121-JFK, cache-fra19153-FRA
last-modified
Wed, 30 Oct 2019 17:37:31 GMT
server
AmazonS3
x-timer
S1573020491.715470,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:10 GMT
x-amz-request-id
1F44FF13739A8ADE
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
1, 2
CSO-logo-white-no-tag.svg
alt.idgesg.net/images/furniture/cso/
2 KB
2 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/cso/CSO-logo-white-no-tag.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1b9444bbd724775e014dfd48a961c462315239eb217180a1e0b1b471ef4c4b7c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
pdRyYNJia3lIsaf66p37pdEte3KoJwwZ
via
1.1 varnish, 1.1 varnish
etag
"5fbfeeb8fc48835e1d6e5819a42b6c0b"
age
5427
x-amz-meta-origin-date-iso8601
2018-11-02T18:18:46.000Z
x-cache
HIT, HIT
status
200
content-length
1730
x-amz-id-2
ld/eRtoAqKMcKK5Z7hhzCL838x8hO5ZEL4jSbqIWMENYcz0r4hnFGxUSlgFvaJ/rg+2ShptC0is=
x-served-by
cache-jfk8122-JFK, cache-fra19153-FRA
last-modified
Fri, 02 Nov 2018 20:25:26 GMT
server
AmazonS3
x-timer
S1573020491.715537,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:10 GMT
x-amz-request-id
86C345AA7BC4A7E2
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
2, 2
NetworkWorld_logo-white-no-tag.svg
alt.idgesg.net/images/furniture/networkworld/
3 KB
3 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/networkworld/NetworkWorld_logo-white-no-tag.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
cce1a9282d617a8475100f0a0505c83464852a4ec34ff854792d8af13dccb8aa

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
stYFwwJhU_K5wdqG2YDDTO_Y2rQjmQ4H
via
1.1 varnish, 1.1 varnish
etag
"e83d03b426e2cff512d1e2f8b00be3c6"
age
5838
x-amz-meta-origin-date-iso8601
2018-11-02T18:14:57.000Z
x-cache
HIT, HIT
status
200
content-length
2641
x-amz-id-2
iH7IL1TINbeKvEux54zKAxDYRAVhgUAVmVX+IceCsnq8hfr28L7+g1E4d6TBp8nb5D9ttJq104s=
x-served-by
cache-jfk8128-JFK, cache-fra19153-FRA
last-modified
Fri, 02 Nov 2018 20:26:11 GMT
server
AmazonS3
x-timer
S1573020491.715534,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:10 GMT
x-amz-request-id
1D50E79F60FFBFC2
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
3, 3
InfoWorld_logo-white-no-tag.svg
alt.idgesg.net/images/furniture/infoworld/
3 KB
3 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/infoworld/InfoWorld_logo-white-no-tag.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
17bb8b5dfa44693e301a436b03b03ef05ed0a581e6e036aef2756a5c03034356

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
iCWBp9tPxAaqtQ9G1uBiqNqsBKm09VdU
via
1.1 varnish, 1.1 varnish
etag
"dd990c1b71bf205702dbce78f3709d65"
age
3798
x-amz-meta-origin-date-iso8601
2018-11-02T18:22:02.000Z
x-cache
HIT, HIT
status
200
content-length
2598
x-amz-id-2
l2eA7CUSFPwjaoEcq2XchBQ9GjXw8Brh3/IDHrhzyNkUCRFGBTv0VnI6VXlTOFHSrERG+y3J3e8=
x-served-by
cache-jfk8146-JFK, cache-fra19153-FRA
last-modified
Fri, 02 Nov 2018 20:25:44 GMT
server
AmazonS3
x-timer
S1573020491.715583,VS0,VS0,VE0
date
Wed, 06 Nov 2019 06:08:10 GMT
x-amz-request-id
E0E0544F1F491750
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
10, 3
truncated
/
120 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0275ec366f3cf18830eb5708a3f72ea10baf05a2f946c541e30691fa60ba4b54

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/png
1200x800-100816727-large.jpg
images.idgesg.net/images/article/2019/11/
601 KB
602 KB
Image
General
Full URL
https://images.idgesg.net/images/article/2019/11/1200x800-100816727-large.jpg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
5936c3beaad015599888d57fe413d7d980662b6f586550784693cd00c126f510

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
NONLRE2BoCZ23aBieGjl4IBUwhkeMsCD
via
1.1 varnish, 1.1 varnish
etag
"b3bb212b81059f418fade51417d1432d"
age
3889
x-cache
HIT, HIT
status
200
content-length
615685
x-amz-id-2
/9+aqEwCmKmLUvBC8sXzUKWyj7lq2VytN6VK/OWNMehZA7VmQeb53ym0Df01nD70r7iN8x61vnE=
x-served-by
cache-jfk8142-JFK, cache-fra19153-FRA
last-modified
Tue, 05 Nov 2019 14:01:15 GMT
server
AmazonS3
x-timer
S1573020491.722658,VS0,VS0,VE1
date
Wed, 06 Nov 2019 06:08:10 GMT
x-amz-request-id
D90B676CE9529FDF
cache-control
public, max-age=2592000
accept-ranges
bytes
content-type
image/jpeg
x-cache-hits
1, 1
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WR6LD2P
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
5673
date
Wed, 06 Nov 2019 04:33:37 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Wed, 06 Nov 2019 06:33:37 GMT
minified_logic.js
automate-prod.s3.amazonaws.com/
16 KB
17 KB
XHR
General
Full URL
https://automate-prod.s3.amazonaws.com/minified_logic.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.231.176.198 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3-us-west-2-w.amazonaws.com
Software
AmazonS3 /
Resource Hash
339ddd9adc9d75824e6001d928d171dc089a061736444904e94f01256dc17d45

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:12 GMT
Last-Modified
Thu, 17 Oct 2019 19:00:36 GMT
Server
AmazonS3
x-amz-request-id
35D41FDEB1C2BBC4
ETag
"c4703ea96079084af11a71b0c8aaa612"
Vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Accept-Ranges
bytes
Content-Length
16408
x-amz-id-2
3Oog1HGZmcbEI6SX5IA6/lPwKGBSsedEtkBlov6ImOc/AZi/IhFZyko13VxLTX3giyeXXRf+Qv0=
oct.js
static.ads-twitter.com/
Redirect Chain
  • https://platform.twitter.com/oct.js
  • https://static.ads-twitter.com/oct.js
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/oct.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.157 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
78909
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-hhn4035-HHN
last-modified
Tue, 23 Jan 2018 20:09:00 GMT
x-timer
S1573020491.761273,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes

Redirect headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:10 GMT
Server
ECS (fcn/41D8)
Content-Length
0
Location
https://static.ads-twitter.com/oct.js
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035308&c3=&c5=Security&c6=Article%3A%20News%20Analysis&c15=3451956&ns__t=1573020490740&ns_c=UTF-8&cv=3.1e&c8=Why%20India%E2%80%99s%20data%20protection%20...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035308&c3=&c5=Security&c6=Article%3A%20News%20Analysis&c15=3451956&ns__t=1573020490740&ns_c=UTF-8&cv=3.1e&c8=Why%20India%E2%80%99s%20data%20protection%2...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=6035308&c3=&c5=Security&c6=Article%3A%20News%20Analysis&c15=3451956&ns__t=1573020490740&ns_c=UTF-8&cv=3.1e&c8=Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole%20%7C%20Computerworld&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c9=
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 06:08:10 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=6035308&c3=&c5=Security&c6=Article%3A%20News%20Analysis&c15=3451956&ns__t=1573020490740&ns_c=UTF-8&cv=3.1e&c8=Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole%20%7C%20Computerworld&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c9=
Pragma
no-cache
Date
Wed, 06 Nov 2019 06:08:10 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
linkid.js
www.google-analytics.com/plugins/ua/
2 KB
928 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/linkid.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 05:08:34 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 22 Oct 2019 18:15:00 GMT
server
sffe
age
3576
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
859
x-xss-protection
0
expires
Wed, 06 Nov 2019 06:08:34 GMT
publisher:getClientId
ampcid.google.com/v1/
74 B
188 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://www.computerworld.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
0
fbevents.js
connect.facebook.net/en_US/
113 KB
25 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
116ff98775e8503b1dd3cb9f9e96494ff88ee04a894778079370ff152f85f453
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
25312
x-xss-protection
0
pragma
public
x-fb-debug
1yo6Ig2h6M7gDCoYPsxI4BPi6QXlGCzL7hTwvhPfHIf/R+e45FdvPbwS3IV1ggz8eePJAgaiWyGoizuc1/MgMw==
x-fb-trip-id
2000377899
x-frame-options
DENY
date
Wed, 06 Nov 2019 06:08:10 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
111346X1569473.skimlinks.js
s.skimresources.com/js/
38 KB
15 KB
Script
General
Full URL
https://s.skimresources.com/js/111346X1569473.skimlinks.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WR6LD2P
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
eb465d2a8aa11024600756e07415c4b6c639f97461062eae932b5f332270fa8f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
last-modified
Tue, 05 Nov 2019 14:56:15 GMT
server
AmazonS3
x-amz-request-id
F0EA0BDD444D363A
etag
"50b2777bd0452e041c48c67702b3c613"
x-hw
1573020490.cds053.fr8.hc,1573020490.cds017.fr8.c
content-type
application/octet-stream
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
15052
x-amz-id-2
MI4Riej4wvMgocyrWOvhvoxbI7Q64ua7CJIJZFDGqbmeETN4JYkOm8zKnSF4I9aD/CmlBOQ9bjs=
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
2 KB
2 KB
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&bcsessionid=44daf071-47ab-4918-844e-c2140f7cb661&bctempid=&overruleReferrer=&time=2019-11-06T07%3A08%3A10%2B01%3A00&ts=1573020490818
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.20.228.30 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-20-228-30.compute-1.amazonaws.com
Software
- /
Resource Hash
fd8c02fe21d9ee7ee30713086d15b1cebf51f53bccebe9031ebfe8422b1a6297
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
912
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
2 KB
2 KB
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&bcsessionid=44daf071-47ab-4918-844e-c2140f7cb661&bctempid=&overruleReferrer=&time=2019-11-06T07%3A08%3A10%2B01%3A00&ts=1573020490822
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.20.228.30 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-20-228-30.compute-1.amazonaws.com
Software
- /
Resource Hash
3e44829b1888cb699a1afe998196f365e0f8c8d95219ed42b412f02dc2ba21c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
912
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
stats
idg.blueconic.net/rest/recommendations/
14 B
523 B
Script
General
Full URL
https://idg.blueconic.net/rest/recommendations/stats?storeId=6cca0c88-4d90-409e-8e8e-3897724a791a&action=view&itemId=www.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html&url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html&profileId=44daf071-47ab-4918-844e-c2140f7cb661&isEntrypage=true&hash=ef5cfcbf4386589710cd57648dc95bcd&referer=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&bcsessionid=44daf071-47ab-4918-844e-c2140f7cb661&bctempid=&overruleReferrer=&time=2019-11-06T07%3A08%3A10%2B01%3A00&callback=bc_json716
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.20.228.30 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-20-228-30.compute-1.amazonaws.com
Software
- /
Resource Hash
4fdd56b86d01f159914d9c5bf5a471f84d2a2aae72a5afee38ba53f197f9bf21
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
-
x-robots-tag
noindex, nofollow
p3p
policyref="", CP="DSP"
status
200
x-permitted-cross-domain-policies
master-only
cache-control
no-cache, no-store, no-transform, must-revalidate, private
content-type
text/javascript;charset=utf-8
content-length
34
x-xss-protection
1; mode=block
expires
Thu, 01 Jan 1970 00:00:00 GMT
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
94 B
979 B
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&bcsessionid=44daf071-47ab-4918-844e-c2140f7cb661&bctempid=&overruleReferrer=&time=2019-11-06T07%3A08%3A10%2B01%3A00&ts=1573020490870
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.20.228.30 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-20-228-30.compute-1.amazonaws.com
Software
- /
Resource Hash
6fe8284d4c9fe9637748ab4c9435322f8e83c8e7a036eb71e10caa4fb1babed8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
105
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
publisher:getClientId
ampcid.google.de/v1/
3 B
117 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://www.computerworld.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
0
783301121827721
connect.facebook.net/signals/config/
295 KB
70 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/783301121827721?v=2.9.10&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
3a8c11ed8694f75cf2265d188726c11349472c55c677753db79d8ad6339d0312
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
72030
x-xss-protection
0
pragma
public
x-fb-debug
aYSVRlCFJeml0nOKuuAMj8L66lsDMi9ikUqBoOY5mv41wgo7vG4xoQ5AP5ii9tLx/ZTUbD+exO3pNhZ5WwIxAg==
x-fb-trip-id
2000377899
x-frame-options
DENY
date
Wed, 06 Nov 2019 06:08:10 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self';
expires
Sat, 01 Jan 2000 00:00:00 GMT
px.gif
p.skimresources.com/
43 B
107 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=8.81629502473338
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
date
Wed, 06 Nov 2019 06:08:10 GMT
x-guploader-uploadid
AEnB2UpxuSKFUoZ0aACKfBYCq7mWtPNM2_wkSvXEzYLHpcs1x_beGViFq829kS1Syb-NOtMRuYx02l-nHa7ST6zWNkfWtuUP6A
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-hw
1573020490.cds053.fr8.hc,1573020490.cds054.fr8.c
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
px.gif
p.skimresources.com/
43 B
471 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=8.81629502473338
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
date
Wed, 06 Nov 2019 06:08:10 GMT
x-guploader-uploadid
AEnB2UpxuSKFUoZ0aACKfBYCq7mWtPNM2_wkSvXEzYLHpcs1x_beGViFq829kS1Syb-NOtMRuYx02l-nHa7ST6zWNkfWtuUP6A
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-hw
1573020490.cds053.fr8.hc,1573020490.cds054.fr8.c
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
robots.txt
t.skimresources.com/api/v2/ Frame 82E7
0
43 B
Image
General
Full URL
https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.6719579090293972
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

status
404
date
Wed, 06 Nov 2019 06:08:10 GMT
via
1.1 google
server
Python/3.7 aiohttp/3.5.4
alt-svc
clear
content-length
0
content-type
application/octet-stream
insight.min.js
snap.licdn.com/li.lms-analytics/
3 KB
2 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:296::25ea , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
41dd5e421fe221a7d2921d6fa2b36e8b01a9f2c054aaef5fad866fe896c1d1e0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:10 GMT
Content-Encoding
gzip
Last-Modified
Mon, 07 Oct 2019 16:41:31 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=28713
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1576
uwt.js
static.ads-twitter.com/
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/uwt.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.157 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
age
78912
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-hhn4035-HHN
last-modified
Tue, 23 Jan 2018 20:09:00 GMT
x-timer
S1573020491.896427,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes
collect
www.google-analytics.com/r/
35 B
111 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j79&a=143629584&t=pageview&_s=1&dl=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&ul=en-us&de=UTF-8&dt=Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole%20%7C%20Computerworld&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=aGBAAEAjAAQC~&jid=1195986707&gjid=2082905447&cid=1128562751.1573020491&uid=&tid=UA-300704-1&_gid=1277038511.1573020491&_r=1&gtm=2wgav3WR6LD2P&cg1=security&cg2=newsanalysis&cg3=Mansi%20Joshi&cg4=article&cg5=us&cd1=false&cd2=&cd3=&cd4=notapplicable&cd5=Wed%2C%2006%20Nov%202019%2006%3A08%3A10%20GMT&cd6=Wed%2C%2006%20Nov%202019%2006%3A08%3A10%20GMT&cd7=0&cd8=1&cd9=production&cd10=computerworld&cd11=US&cd12=enterprise&cd13=false&cd14=&cd15=Web&cd16=&cd17=security&cd18=2206&cd19=technology%20industry&cd20=2206%2C3871&cd21=&cd22=&cd23=&cd24=&cd25=&cd26=newsanalysis&cd27=3451956&cd28=article&cd29=Mansi%20Joshi&cd30=computerworld&cd31=false&cd32=&cd33=&cd34=&cd35=&cd36=&cd37=false&cd38=1&cd39=2019-11-05&cd40=2019-11-05&cd41=0&cd42=0&cd43=false&cd44=false&cd45=&cd46=false&cd47=&cd48=&cd49=&cd50=&cd51=&cd52=&cd53=941&cd54=683&cd55=&cd56=&cd79=us&cd80=in&cd81=false&cd82=false&cd83=20191106060809&cd84=&z=126260807
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 06:08:10 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
collect
www.google-analytics.com/
35 B
108 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j79&a=143629584&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&ul=en-us&de=UTF-8&dt=Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole%20%7C%20Computerworld&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=BlueConic%20Data&ea=success&_u=aGDAAEAjAAQC~&jid=&gjid=&cid=1128562751.1573020491&uid=&tid=UA-300704-1&_gid=1277038511.1573020491&gtm=2wgav3WBVXW9&cg1=security&cg2=newsanalysis&cg3=Mansi%20Joshi&cg4=article&cg5=us&cd1=false&cd2=&cd3=&cd4=notapplicable&cd5=Wed%2C%2006%20Nov%202019%2006%3A08%3A10%20GMT&cd6=Wed%2C%2006%20Nov%202019%2006%3A08%3A10%20GMT&cd7=0&cd8=1&cd9=production&cd10=computerworld&cd11=US&cd12=enterprise&cd13=false&cd14=&cd15=Web&cd16=&cd17=security&cd18=2206&cd19=technology%20industry&cd20=2206%2C3871&cd21=&cd22=&cd23=&cd24=&cd25=&cd26=newsanalysis&cd27=3451956&cd28=article&cd29=Mansi%20Joshi&cd30=computerworld&cd31=false&cd32=&cd33=&cd34=&cd35=&cd36=&cd37=false&cd38=1&cd39=2019-11-05&cd40=2019-11-05&cd41=0&cd42=0&cd43=false&cd44=false&cd45=&cd46=false&cd47=&cd48=&cd49=&cd50=&cd51=&cd52=&cd53=941&cd54=683&cd55=&cd56=&cd79=us&cd80=in&cd58=44daf071-47ab-4918-844e-c2140f7cb661&cd59=0&cd60=Placement%20ID%7CAll%20Visitors%7CVisited%20any%20B2B%7CNot%20subscribed%20to%20Sailthru%7CLanded%20through%20campaign%7C%5BBC%20Expert%5D%20%E2%80%93%20Unknown%20(no%20email%20address)%7CIP%20address%7CCW%20visitors%7CVisitors%20not%20in%20segment%20%22zach%20test%20segment%22&z=1000899016
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81b::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 30 Oct 2019 23:08:21 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
543589
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
/
r.skimresources.com/api/
Redirect Chain
  • https://r.skimresources.com/api/
  • https://r.skimresources.com/api/?xguid=01DRZN7Q5FJNK9MCE15A5AXNN6&persistence=1&checksum=2c80f7144b7741de30d6fc46e0211bd8b640ee27b1cb5dd34841f857c6a06556
166 B
420 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DRZN7Q5FJNK9MCE15A5AXNN6&persistence=1&checksum=2c80f7144b7741de30d6fc46e0211bd8b640ee27b1cb5dd34841f857c6a06556
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
cbeef50c5577f9112d78a9caa37b69473177679a489d30717b0ed286030bbefa
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.computerworld.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google

Redirect headers

date
Wed, 06 Nov 2019 06:08:10 GMT
via
1.1 google
server
openresty/1.11.2.5
status
307
location
//r.skimresources.com/api/?xguid=01DRZN7Q5FJNK9MCE15A5AXNN6&persistence=1&checksum=2c80f7144b7741de30d6fc46e0211bd8b640ee27b1cb5dd34841f857c6a06556
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.computerworld.com
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193
/
www.facebook.com/tr/
44 B
258 B
Image
General
Full URL
https://www.facebook.com/tr/?id=783301121827721&ev=PageView&dl=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&rl=&if=false&ts=1573020490931&sw=1600&sh=1200&v=2.9.10&r=stable&ec=0&o=30&fbp=fb.1.1573020490931.1880677225&it=1573020490886&coo=false&exp=b0&rqm=GET
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-23=":443"; ma=3600
content-length
44
expires
Wed, 06 Nov 2019 06:08:10 GMT
/
www.facebook.com/tr/
44 B
213 B
Image
General
Full URL
https://www.facebook.com/tr/?id=783301121827721&ev=ViewContent&dl=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&rl=&if=false&ts=1573020490933&sw=1600&sh=1200&v=2.9.10&r=stable&ec=1&o=30&fbp=fb.1.1573020490931.1880677225&it=1573020490886&coo=false&exp=b0&rqm=GET
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-23=":443"; ma=3600
content-length
44
expires
Wed, 06 Nov 2019 06:08:10 GMT
collect
px.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=45909%2C1156330%2C116509&url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfectio...
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D45909%252C1156330%252C116509%26url%3Dhttps%253A%252F%252Fwww.computerworld.com%25...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=45909%2C1156330%2C116509&url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfectio...
0
309 B
Image
General
Full URL
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=45909%2C1156330%2C116509&url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&time=1573020490941&liSync=true
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:10:101::b93f:9105 , Ireland, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:11 GMT
content-encoding
gzip
nel
{"report_to":"network-errors","max_age":1296000,"success_fraction":0.00066,"failure_fraction":1,"include_subdomains":true}
server
Play
vary
Accept-Encoding
report-to
{"group":"network-errors","max_age":2592000,"endpoints":[{"url":"https://www.linkedin.com/li/rep"}],"include_subdomains":true}
x-li-fabric
prod-lva1
status
200
x-li-proto
http/2
x-li-pop
prod-efr5
content-type
application/javascript
content-length
20
x-li-uuid
6ef1b8191BWQnIMBAysAAA==

Redirect headers

date
Wed, 06 Nov 2019 06:08:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
302
vary
Accept-Encoding
content-length
20
x-li-uuid
YDKRac191BXgeOha0SoAAA==
server
Play
pragma
no-cache
x-li-pop
prod-efr5
x-frame-options
sameorigin
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
strict-transport-security
max-age=2592000
x-li-fabric
prod-lva1
location
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=45909%2C1156330%2C116509&url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&time=1573020490941&liSync=true
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob:; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/insight.min.js; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'
x-li-proto
http/2
expires
Thu, 01 Jan 1970 00:00:00 GMT
adsct
t.co/i/
43 B
449 B
Image
General
Full URL
https://t.co/i/adsct?p_id=Twitter&p_user_id=0&txn_id=nvk5o&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.5 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
110
pragma
no-cache
last-modified
Wed, 06 Nov 2019 06:08:11 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=0
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
490e253e2d6380a091d7facbb08cdefc
x-transaction
007d60fd00825cf9
expires
Tue, 31 Mar 1981 05:00:00 GMT
iab
api.skimlinks.mgr.consensu.org/
772 B
396 B
XHR
General
Full URL
https://api.skimlinks.mgr.consensu.org/iab?nocache=1573020490956
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/111346X1569473.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.40.172 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
172.40.190.35.bc.googleusercontent.com
Software
nginx/1.14.0 /
Resource Hash
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:10 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx/1.14.0
access-control-allow-headers
*
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, DELETE, OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.computerworld.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
page
t.skimresources.com/api/v2/
22 B
114 B
XHR
General
Full URL
https://t.skimresources.com/api/v2/page
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/111346X1569473.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-type
text/plain

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 06:08:10 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://www.computerworld.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
alt-svc
clear
content-length
22
link
t.skimresources.com/api/v2/
22 B
91 B
XHR
General
Full URL
https://t.skimresources.com/api/v2/link
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/111346X1569473.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-type
text/plain

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 06:08:10 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://www.computerworld.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
alt-svc
clear
content-length
22
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
105 B
676 B
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&bcsessionid=No%20profile%20present%20and%20will%20not%20be%20created.&bctempid=&overruleReferrer=&time=2019-11-06T07%3A08%3A11%2B01%3A00&ts=1573020491027
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.20.228.30 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-20-228-30.compute-1.amazonaws.com
Software
- /
Resource Hash
bded91f4f19819e9b34017a915e80c1ce4f62df146bc57e573b1746d0e149cd1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 06:08:11 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
113
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
get
odb.outbrain.com/utils/
34 KB
13 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html&settings=true&recs=true&widgetJSId=AR_1&key=NANOWDGT01&idx=0&version=104070&apv=false&sig=erNz91rR&format=html&va=true&rand=37229&pdobuid=-1&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&secured=true&cmpStat=1&ref=
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573020489762
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
36b312131769153599a38cb9141b935ec3fe27f0d235500bcd5bc1142ad2f99c
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
NYDC1, JFK, HHN, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-cache-hits
0, 0
x-traceid
eef6e35ff2f88346247e149e6ccec2c5
content-length
12658
x-served-by
cache-jfk8146-JFK, cache-hhn4054-HHN
pragma
no-cache
x-timer
S1573020491.270353,VS0,VE129
date
Wed, 06 Nov 2019 06:08:11 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
no-cache
backend-ip
104.156.90.46
accept-ranges
bytes, bytes
expires
Thu, 01 Jan 1970 00:00:00 GMT
ob_smartFeedLogo.min.svg
widgets.outbrain.com/images/widgetIcons/
7 KB
7 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/ob_smartFeedLogo.min.svg
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573020489762
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
8050f05c230d74be333b63cef230e786094e9100f55fa19c6c0831e95870768d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:11 GMT
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"f370d19306add072a726e7f4ade8dc57:1572966023"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/svg+xml
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
7090
achoice.svg
widgets.outbrain.com/images/widgetIcons/
3 KB
2 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/achoice.svg
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573020489762
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
2c87952cc1c23627496c7874271042bdb6af21efdf7cbf36ec4d98e6cec34d04

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:11 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"9d26fa4e7238ed94f1d0d92afb453b3e:1572966000"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
image/svg+xml
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
1368
l
mcdp-nydc1.outbrain.com/
4 B
377 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=324dad363bac98777f35109b6ec1d75b_28423_1573020491347&tm=753&eT=0&widgetWidth=970&widgetHeight=694&widgetX=315&widgetY=4859&wRV=104070&pVis=1&lsd=8ae25202-b8d1-4e5c-8661-8de7cb68ea53&eIdx=&cheq=0&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573020489762
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.31 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:11 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
16e082ae4e89046e71a505008b8ed31f
Content-Length
30
proxy.js
widgets.outbrain.com/nanoWidget/104070/module/
823 B
853 B
Script
General
Full URL
https://widgets.outbrain.com/nanoWidget/104070/module/proxy.js
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573020489762
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
a95b9d7926bbd7b2c530faf8bd0352491a539758540b78749372927bd8716b14

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:11 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"ddd80d77cddabf6732bc5d9534b86f1d:1572966052"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=345600
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
360
obUserSync.html
widgets.outbrain.com/widgetOBUserSync/ Frame 0B5B
0
0
Document
General
Full URL
https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573020489762
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
widgets.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Accept-Encoding
gzip, deflate, br
Cookie
akacd_widgets_routing=3750473289~rv=20~id=f5e0a614db8e3a129cfa35cd30bbbf5a; obuid=8ae25202-b8d1-4e5c-8661-8de7cb68ea53; recs_e05a921dcf412ea4536b468a15c12d30=0B2395937617A1925901673A2229989104A2355440387A2212391210A2417301361ACD1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809

Response headers

Server
Apache
ETag
"92a540925bae013b3eb0aec73fff0e65:1572781658"
Last-Modified
Sun, 03 Nov 2019 11:44:44 GMT
Accept-Ranges
bytes
Content-Type
text/html
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
3504
Cache-Control
max-age=604800
Date
Wed, 06 Nov 2019 06:08:11 GMT
Connection
keep-alive
Timing-Allow-Origin
*
Access-Control-Allow-Credentials
false
Access-Control-Allow-Methods
GET,POST
Access-Control-Allow-Origin
*
NVPInjector.min.js
widgets.outbrain.com/nativeVideoPlayer/
13 KB
5 KB
Script
General
Full URL
https://widgets.outbrain.com/nativeVideoPlayer/NVPInjector.min.js
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573020489762
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
2e5db12b7bc11cb638f81918df0b68bc7026a2c1e29ac02f2e056dba2cf7303b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:11 GMT
Content-Encoding
gzip
Last-Modified
Wed, 01 May 2019 09:33:13 GMT
Server
Apache
ETag
"5cce9fcde7926b25032da388b4c2be7f:1556703193"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=345600
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
4726
streamFeed.js
widgets.outbrain.com/nanoWidget/104070/module/
39 KB
13 KB
Script
General
Full URL
https://widgets.outbrain.com/nanoWidget/104070/module/streamFeed.js
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573020489762
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
99401b4affbff50814c870c81139a860c1db634186af1a7d656d74d88eb733a6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:11 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"a9d6b8c7aab4d69558f75f6d9bc46807:1572966063"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=345600
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
13008
play_100x100.png
widgets.outbrain.com/images/widgetIcons/
9 KB
10 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/play_100x100.png
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
bbcd8c21e24392c2c8ef2c5df39578e95b2bff035be4930cbc53b996087783a6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:11 GMT
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"25a69b3019e3b959aef033482762080f:1572966031"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
9422
vidget.js
libs.outbrain.com/vidget/
116 KB
29 KB
Script
General
Full URL
https://libs.outbrain.com/vidget/vidget.js
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573020489762
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
48034e50da660af17f1ee90536b337d7bd83170341ebc96d9d4386f14a61d12b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:11 GMT
Content-Encoding
gzip
Connection
keep-alive
Content-Length
28849
Pragma
no-cache
Last-Modified
Tue, 05 Nov 2019 08:52:04 GMT
Server
Apache
ETag
"4028987819465583586db0cb5865fdb1:1572943924"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Wed, 06 Nov 2019 06:08:11 GMT
obp.min.js
libs.sphere.com/video/outbrain-player/current/
94 KB
20 KB
Script
General
Full URL
https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/nativeVideoPlayer/NVPInjector.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.250 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-250.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
73094735f396bba106c04ae44386ab03f8b50605bb0a622f8b57b067ad5f428e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:11 GMT
Content-Encoding
gzip
Connection
keep-alive
Content-Length
20382
Pragma
no-cache
Last-Modified
Wed, 30 Oct 2019 07:58:51 GMT
Server
Apache
ETag
"82e1acf271a9cf172b590be5d2c0089c:1572422331"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Wed, 06 Nov 2019 06:08:11 GMT
get
mv.outbrain.com/Multivac/api/
39 KB
10 KB
Script
General
Full URL
https://mv.outbrain.com/Multivac/api/get?url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html&settings=true&recs=true&widgetJSId=AR_1&key=NANOWDGT01&version=104070&apv=true&sig=erNz91rR&format=html&rand=99795&lsd=8ae25202-b8d1-4e5c-8661-8de7cb68ea53&lsdt=1573020491403&pdobuid=0&osLang=en-US&va=true&cmpStat=1&scrW=1600&scrH=1200&t=MzI0ZGFkMzYzYmFjOTg3NzdmMzUxMDliNmVjMWQ3NWI=&winW=1600&winH=1200&adblck=false&secured=true&feedIdx=0&lastIdx=0&lastCardIdx=0&fAB=no_abtest
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/nanoWidget/104070/module/streamFeed.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
92b57ddafdfabe6b9d8277c4d4056b3bf53193e32c30e6338f4c53dcadbe050f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:11 GMT
content-encoding
gzip
traffic-path
NYDC1, JFK, HHN, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-cache-hits
0, 0
x-traceid
3a7fb6a9f13b05cb7af9863b37095f72
content-length
10265
x-served-by
cache-jfk8128-JFK, cache-hhn4054-HHN
pragma
no-cache
x-timer
S1573020491.437132,VS0,VE282
vary
Accept-Encoding, User-Agent
content-type
application/json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
no-cache
backend-ip
104.156.90.28
accept-ranges
bytes, bytes
expires
Thu, 01 Jan 1970 00:00:00 GMT
/
www.facebook.com/tr/
0
76 B
Other
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
multipart/form-data; boundary=----WebKitFormBoundaryQNKterIoqkt9srxd

Response headers

strict-transport-security
max-age=31536000; includeSubDomains
server
proxygen-bolt
date
Wed, 06 Nov 2019 06:08:11 GMT
status
200
content-type
text/plain
access-control-allow-origin
https://www.computerworld.com
access-control-allow-credentials
true
alt-svc
h3-23=":443"; ma=3600
content-length
0
getDocFeatures
videoclientsservicescalls.outbrain.com/
275 B
508 B
Script
General
Full URL
https://videoclientsservicescalls.outbrain.com/getDocFeatures?docId=2486948652&pubId=28423&callback=OB_VidgetServiceCallBack0
Requested by
Host: libs.outbrain.com
URL: https://libs.outbrain.com/vidget/vidget.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.31 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
4cbc788788aa6e130df3ebde14ec8c2859c34a14a59a9e07e6fca8198b701820

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:11 GMT
Content-Encoding
gzip
Connection
close
ETag
W/"113-nr4AnEkdqdjUGALNY2jLuiCerFE"
Transfer-Encoding
chunked
Content-Type
text/html; charset=utf-8
obp.min.css
libs.sphere.com/video/outbrain-player/current/
1 KB
1 KB
Stylesheet
General
Full URL
https://libs.sphere.com/video/outbrain-player/current/obp.min.css
Requested by
Host: libs.sphere.com
URL: https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.250 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-250.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
1185ac7ee0922936a46115cf79bf1d9d704792bef6dc6dccf96215d874e9f706

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:11 GMT
Content-Encoding
gzip
Connection
keep-alive
Content-Length
470
Pragma
no-cache
Last-Modified
Wed, 30 Oct 2019 07:59:12 GMT
Server
Apache
ETag
"6990dba1bfaa593cddc30001b4d27ad4:1572422352"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
text/css
Access-Control-Allow-Origin
*
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Wed, 06 Nov 2019 06:08:11 GMT
xp35fk24bu8fvo1ajpk3qdt2izxuffjj
automate.linksynergy.com/wakeup/
38 B
592 B
XHR
General
Full URL
https://automate.linksynergy.com/wakeup/xp35fk24bu8fvo1ajpk3qdt2izxuffjj
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.72.8.4 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-72-8-4.compute-1.amazonaws.com
Software
nginx/1.12.2 /
Resource Hash
dc8f8ba0a0fc19b41c98427556de43ce8d80873d74b3a9af5d81e6b5b69b4150
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:11 GMT
Server
nginx/1.12.2
X-Frame-Options
SAMEORIGIN
Access-Control-Allow-Methods
PUT, OPTIONS, POST
P3p
CP="NOI DSP COR CURa ADMa DEVa OUR BUS STA"
Access-Control-Allow-Origin
https://www.computerworld.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Access-Control-Allow-Headers
Content-Type
Content-Length
38
xp35fk24bu8fvo1ajpk3qdt2izxuffjj
automate-prod.s3.amazonaws.com/info/
161 KB
161 KB
XHR
General
Full URL
https://automate-prod.s3.amazonaws.com/info/xp35fk24bu8fvo1ajpk3qdt2izxuffjj
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.231.176.198 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
s3-us-west-2-w.amazonaws.com
Software
AmazonS3 /
Resource Hash
af05895b7328c2ca16bb69f9b8a1f904f45a5457a29320de0755ad784c29a43f

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:13 GMT
Last-Modified
Tue, 05 Nov 2019 21:09:39 GMT
Server
AmazonS3
x-amz-request-id
8911E54FFD3FE47D
ETag
"6c810e16db769b0fba5a83d31b4df95e"
Vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method
Access-Control-Allow-Methods
GET
Content-Type
text/plain
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Accept-Ranges
bytes
Content-Length
164656
x-amz-id-2
iPuZVpD+7HnCvq79Or41ZkwH2U6ep0ygluf2lKq0TC7kcdqIsMf4hBs1itPOVgi29i2Qu489v1c=
l
mcdp-nydc1.outbrain.com/
4 B
377 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=474502d4fde7cb155bffb2e424e3df32_28423_1573020491525&tm=1104&eT=0&widgetWidth=970&widgetHeight=307&widgetX=315&widgetY=5573&wRV=104070&pVis=0&lsd=8ae25202-b8d1-4e5c-8661-8de7cb68ea53&eIdx=&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573020489762
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.31 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:12 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
423ac9842e2bc6f39ab97e5517c9b70b
Content-Length
30
l
mcdp-nydc1.outbrain.com/
4 B
377 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=aaeb9d9b023a0b7c67548c1c76818010_28423_1573020491662&tm=1111&eT=0&widgetWidth=970&widgetHeight=406&widgetX=315&widgetY=5900&wRV=104070&pVis=1&lsd=8ae25202-b8d1-4e5c-8661-8de7cb68ea53&eIdx=&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573020489762
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.31 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:12 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
1c7c23795d5dc3ce40cc7585da63bd2f
Content-Length
30
eyJpdSI6ImM1MTg4OWE2Y2E4Y2FmZGY4N2I1MmYwMDFjZThjMzY1MTdlMWI2YWUyNTQ2ZjI5YjViZGFmZDFhMzA2M2E3YzkiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
32 KB
33 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImM1MTg4OWE2Y2E4Y2FmZGY4N2I1MmYwMDFjZThjMzY1MTdlMWI2YWUyNTQ2ZjI5YjViZGFmZDFhMzA2M2E3YzkiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.70.82 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-70-82.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
226834c939f46dea4bc165b9928c8274c1cf1b289b0b13226ca4863f7ed75d81
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Thu, 31 Oct 2019 08:13:46 GMT
Date
Wed, 06 Nov 2019 06:08:11 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1996491
Connection
keep-alive
X-TraceId
29200173791772473df35e53a39bb080
Timing-Allow-Origin
*
Content-Length
33026
eyJpdSI6ImFjZTQ1YjgzODBmZGYwM2UwNDhmYzlkZmIzMTc4YmJkMjNmOGYxZDVhNmMxYjRhMjY2ODhhNzc3NTk0ZDVkN2YiLCJ3Ijo0MCwiaCI6NDAsImQiOjIuMCwiY3MiOjAsImYiOjR9.webp
images.outbrainimg.com/transform/v3/
2 KB
2 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImFjZTQ1YjgzODBmZGYwM2UwNDhmYzlkZmIzMTc4YmJkMjNmOGYxZDVhNmMxYjRhMjY2ODhhNzc3NTk0ZDVkN2YiLCJ3Ijo0MCwiaCI6NDAsImQiOjIuMCwiY3MiOjAsImYiOjR9.webp
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.70.82 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-70-82.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6048da54b34a251c1922ae08d28662079a9c75b0d09b5bab6de2e472af1a8c3b
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sat, 19 Oct 2019 07:18:27 GMT
Date
Wed, 06 Nov 2019 06:08:11 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2428355
Connection
keep-alive
X-TraceId
6e128ea07ae80c01bcecc5ad34136414
Timing-Allow-Origin
*
Content-Length
2074
eyJpdSI6ImM3NzY5NmY5MzcyZWRmZWEzYmI4NWU1NGI3ZGM1OTgzNDNlYzQ4MmEwMDFlZGQzZmZlZTk5NGY1MjcwZWQ4MjEiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
45 KB
46 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImM3NzY5NmY5MzcyZWRmZWEzYmI4NWU1NGI3ZGM1OTgzNDNlYzQ4MmEwMDFlZGQzZmZlZTk5NGY1MjcwZWQ4MjEiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.70.82 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-70-82.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b499c37f6001c55e4e2edcaca4d0fe957becec50dede1b9cb29088663e2480c5
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 08:25:57 GMT
Date
Wed, 06 Nov 2019 06:08:11 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2385674
Connection
keep-alive
X-TraceId
a47c41d4e3d3f2a04d4df6173cef6bbd
Timing-Allow-Origin
*
Content-Length
46480
eyJpdSI6IjRlN2YxMDBmZjQ5ZTU2ZTI2MjMyNDFhZjkxMWYxZjQ1MjA4ZTcyYWZlOWJiMGJiNjk5ZmRmNjNiNzVjODlhMTkiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
56 KB
56 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjRlN2YxMDBmZjQ5ZTU2ZTI2MjMyNDFhZjkxMWYxZjQ1MjA4ZTcyYWZlOWJiMGJiNjk5ZmRmNjNiNzVjODlhMTkiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.70.82 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-70-82.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f07e1b59ec9c46b598e086a66516359360bd764bcbb2243833b66b17b1a732ab
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 01 Nov 2019 19:46:41 GMT
Date
Wed, 06 Nov 2019 06:08:11 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2116025
Connection
keep-alive
X-TraceId
39c6de54fe3b141b20d1baad9467cbcc
Timing-Allow-Origin
*
Content-Length
57343
eyJpdSI6IjlkYTdlZWQ5ZWQzYjI3ZDUyNGVlOTJjOGJkMmZhMGU0NWUwZTNiMTcxM2M4ZmVmYTFhZDJiODFlYjk4ZjFlMGQiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
31 KB
32 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjlkYTdlZWQ5ZWQzYjI3ZDUyNGVlOTJjOGJkMmZhMGU0NWUwZTNiMTcxM2M4ZmVmYTFhZDJiODFlYjk4ZjFlMGQiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.70.82 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-70-82.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
f505486ed02de32db4a4237271c97761e43900deb1b07d97c89b53f4fddc0989
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 04 Oct 2019 08:11:36 GMT
Date
Wed, 06 Nov 2019 06:08:11 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1686031
Connection
keep-alive
X-TraceId
e0dc59d788cee5a09db82a176f0e64cc
Timing-Allow-Origin
*
Content-Length
32137
eyJpdSI6IjQ0NWI1ZDhiMzkxYTI0MGNlNDE3NTZiMDIyYWU4OWZlZWJlMWUyMGYwNjM0MzEyYmUwNGE4ZjNlMWUyNmNmMjciLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
96 KB
97 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjQ0NWI1ZDhiMzkxYTI0MGNlNDE3NTZiMDIyYWU4OWZlZWJlMWUyMGYwNjM0MzEyYmUwNGE4ZjNlMWUyNmNmMjciLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.70.82 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-70-82.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
fe2ea18269fc1dc861da590af05ef7100408df75bf5b0d56f340403782382285
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Fri, 18 Oct 2019 00:54:41 GMT
Date
Wed, 06 Nov 2019 06:08:11 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1164557
Connection
keep-alive
X-TraceId
235d14460f708c9345d8d1ae35cd6f
Timing-Allow-Origin
*
Content-Length
98734
ob_logo_67x12.png
widgets.outbrain.com/images/widgetIcons/
2 KB
3 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/ob_logo_67x12.png
Requested by
Host: libs.outbrain.com
URL: https://libs.outbrain.com/vidget/vidget.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
487aec7746a83542b3573383df65747e31c494d8412103b5675329f3d4befaeb

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:11 GMT
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"c52b07e749f7a09fa7b97b7e195e06ce:1572966016"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
2326
vpt.js
static.vidazoo.com/basev/
38 KB
11 KB
Script
General
Full URL
https://static.vidazoo.com/basev/vpt.js
Requested by
Host: libs.outbrain.com
URL: https://libs.outbrain.com/vidget/vidget.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
70a054db0f1fa8a0b2398f9583f737b84a62f7b5704a1a94722d6e08f745bf3a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:11 GMT
Content-Encoding
gzip
Last-Modified
Wed, 02 Oct 2019 09:36:14 GMT
ETag
"1570008974"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=48827
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
9872
X-HW
1573020491.dop040.fr8.shc,1573020491.dop040.fr8.t,1573020491.cds122.fr8.c
extend
bis.vidazoo.com/event/
0
438 B
XHR
General
Full URL
https://bis.vidazoo.com/event/extend
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/vpt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.203.65.11 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-203-65-11.compute-1.amazonaws.com
Software
Cowboy /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-type
application/json; charset=UTF-8

Response headers

Date
Wed, 06 Nov 2019 06:08:12 GMT
Via
1.1 vegur
Server
Cowboy
P3p
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Connection
keep-alive
Access-Control-Allow-Headers
Origin, DNT, X-Requested-With, Keep-Alive, Content-Type, Accept, Cache-Control, Pragma, Authorization, Content-Length, Accept-Encoding, Accept-Language
Content-Length
0
json
server.vidazoo.com/campaigns/5a9ea5a0225f7d0004c70045/5ae0a5c0da5fdd00042f78f5/
53 KB
22 KB
XHR
General
Full URL
https://server.vidazoo.com/campaigns/5a9ea5a0225f7d0004c70045/5ae0a5c0da5fdd00042f78f5/json
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/vpt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.203.78.22 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-203-78-22.compute-1.amazonaws.com
Software
Cowboy /
Resource Hash
6dcf5cf9baf5b15be18f71e471df92c68218e8eea908958151953dca083f9019

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-type
application/json; charset=UTF-8

Response headers

Date
Wed, 06 Nov 2019 06:08:12 GMT
Content-Encoding
gzip
Server
Cowboy
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
https://www.computerworld.com
Cache-Control
max-age=0, no-cache, must-revalidate, proxy-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Access-Control-Allow-Headers
Origin, X-Requested-With, Content-Type, Accept, Authorization, Content-Range, Cache-Control
Content-Length
22125
Via
1.1 vegur
adsct
analytics.twitter.com/i/
31 B
634 B
Script
General
Full URL
https://analytics.twitter.com/i/adsct?p_id=Twitter&p_user_id=0&txn_id=nvk5o&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&tpx_cb=twttr.conversion.loadPixels&tw_document_href=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809
Requested by
Host: static.ads-twitter.com
URL: https://static.ads-twitter.com/uwt.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.131 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
df3e003cc30e9bdd0313100e8ee5d468070b4b34d11ad355f276a356d4b9c7bf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
57
x-xss-protection
0
x-response-time
122
pragma
no-cache
last-modified
Wed, 06 Nov 2019 06:08:11 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
application/javascript;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
2faeffb670916bbc2258b1f0a2150f59
x-transaction
005db9930015139a
expires
Tue, 31 Mar 1981 05:00:00 GMT
connatix.renderer.infeed.min.js
cdn.connatix.com/min/
957 B
1 KB
Script
General
Full URL
https://cdn.connatix.com/min/connatix.renderer.infeed.min.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash
a68bb064f603d2e0bfeb4ba53f476efb38b56a7b52a9437fb67a05519527881c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:11 GMT
via
1.1 varnish
server
Varnish
age
0
x-served-by
cache-hhn4036-HHN
x-cache
HIT
content-type
application/javascript
status
200
x-referer-host
computerworld.com
cache-control
no-cache, no-store, must-revalidate, max-age=0
accept-ranges
bytes
x-timer
S1573020492.899372,VS0,VE0
content-length
957
retry-after
0
x-cache-hits
0
connatix.renderer.infeed.min_dc.js
cdns.connatix.com/p/1784/min/ Frame 8D10
718 KB
186 KB
Script
General
Full URL
https://cdns.connatix.com/p/1784/min/connatix.renderer.infeed.min_dc.js
Requested by
Host: cdn.connatix.com
URL: https://cdn.connatix.com/min/connatix.renderer.infeed.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
7b2c189a93fd17b7f9ed38cb76de18dd793c01fce2bd8e29beeccb2dd8174867

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:11 GMT
content-encoding
gzip
age
75500
x-cache
HIT, HIT
status
200
content-length
190548
x-served-by
cache-dca17728-DCA, cache-hhn4036-HHN
access-control-allow-origin
*
last-modified
Tue, 05 Nov 2019 08:58:49 GMT
x-timer
S1573020492.933377,VS0,VE0
etag
"b9725a8aae61033fce0c8c538ca9d474"
vary
Accept-Encoding
content-type
application/x-javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=31557600
accept-ranges
bytes
x-cache-hits
1, 3656
g
ck.connatix.com/
46 B
126 B
Script
General
Full URL
https://ck.connatix.com/g?callback=cnxJSONP_2b29e9026ddbd4ef10d01573020491967
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1784/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash
c8253ef0376515b2030cc25e0b2d405a4c8308784a4c4f02a0c0ee48947d62ba

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:11 GMT
via
1.1 varnish
server
Varnish
age
0
x-served-by
cache-fra19175-FRA
x-cache
HIT
status
200
cache-control
no-cache, no-store, must-revalidate, max-age=0
accept-ranges
bytes
x-timer
S1573020492.972744,VS0,VE0
content-length
46
retry-after
0
x-cache-hits
0
obp-slide-center.css
libs.sphere.com/video/outbrain-player/current/
717 B
850 B
XHR
General
Full URL
https://libs.sphere.com/video/outbrain-player/current/obp-slide-center.css
Requested by
Host: libs.sphere.com
URL: https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.250 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-250.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
76f037243db426f4e0d4e74c809969c610b4cab9555c2e14a4472a9f2c449366

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:12 GMT
Content-Encoding
gzip
Connection
keep-alive
Content-Length
264
Pragma
no-cache
Last-Modified
Wed, 30 Oct 2019 08:00:14 GMT
Server
Apache
ETag
"73ca457e68e30047fdef6d92886f8b71:1572422414"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
text/css
Access-Control-Allow-Origin
https://www.computerworld.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Wed, 06 Nov 2019 06:08:12 GMT
pls
core.connatix.com/ Frame 8D10
4 KB
2 KB
Script
General
Full URL
https://core.connatix.com/pls?callback=jQuery321030453062331449_1573020491960&token=fd16fb87-3a00-4fa6-9f4a-a3057d6342f0&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c_v=1784_1_0_0_0&page_guid=92065628d8f1cac85fd01573020492022&spp=1&_=1573020491961
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1784/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.195.95.173 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-195-95-173.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
a3ea2b4db065d9c89b90f34b6eead5c48ee9653c6add7bcef54e8e60af2825b8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

status
200
date
Wed, 06 Nov 2019 06:08:12 GMT
content-encoding
gzip
server
nginx/1.15.9 (Ubuntu)
access-control-allow-origin
*
getFocusExtraData
videoadextradata.outbrain.com/VideoAdExtraData/api/
25 B
234 B
Script
General
Full URL
https://videoadextradata.outbrain.com/VideoAdExtraData/api/getFocusExtraData?adId=139477402&callback=obpExtraDataCallback0
Requested by
Host: libs.sphere.com
URL: https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.31 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
d442840bdefe3895f27babba83b820c7788568379c220b98618b3cd443b64bfa

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:12 GMT
Connection
close
ETag
W/"19-zJz1yJA6zWbTgJszsxnNN601tkc"
Content-Length
25
Content-Type
text/html; charset=utf-8
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/png
1.jpg
i.connatix.com/s3/connatix-uploads/f7e93031-3802-49c9-b029-968fa78207fd/
12 KB
12 KB
Image
General
Full URL
https://i.connatix.com/s3/connatix-uploads/f7e93031-3802-49c9-b029-968fa78207fd/1.jpg?mode=stretch&connatiximg=true&scale=both&height=225&width=400
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
b12dce78cf2b8b83b42e726d08b927c403c12fc923732ffc3d0adac01a90c41b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:12 GMT
via
1.1 varnish, 1.1 varnish
age
80838
x-served-by
cache-sjc3141-SJC, cache-fra19175-FRA
status
200
x-cache
HIT, HIT
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes
x-timer
S1573020493.501183,VS0,VE0
content-length
11995
x-cache-hits
1, 1
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 8D10
273 KB
93 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1784/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
08d851026bab1d4b8c1e46b8713c9a5821f7c5dcfd058735f9e036aac5197553
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
94730
x-xss-protection
0
expires
Wed, 06 Nov 2019 06:08:12 GMT
gePublisherName
videoclientsservicescalls.outbrain.com/
40 B
249 B
Script
General
Full URL
https://videoclientsservicescalls.outbrain.com/gePublisherName?pubId=28423&callback=OB_CtwClientCalls
Requested by
Host: libs.sphere.com
URL: https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.31 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
3ca37abbf9299e4b5a886bb7ca2782851a515c4c1cc670cd4c8ac4a59bf3aa5e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:12 GMT
Connection
close
ETag
W/"28-T5RgnpJKjz4Ap6e8Kk/EFWed5Y0"
Content-Length
40
Content-Type
text/html; charset=utf-8
r
trk.connatix.com/ Frame 8D10
0
162 B
Image
General
Full URL
https://trk.connatix.com/r?connatix_sess=Gqme1a7l6QNBFoe3kXx0dFUDPqEVWwdsuPVBw1RImW6T4OXC-OOph15rm9SJW0XZ7hijBRudtZWFosLatmM4zS4XMXM2uPNQDXeVrEGfDGDK3dkufL8D_kJ4aa257vGnLR5Rv1y3nvZgAiCw_O88i84-1O1-ccPDrNU8N8SkhzcYrdLxD5_leEPgHRqZbQQ3&videoID=934153&c_pl=3hi9YlPNBIo73Cxid5l6v2XwHc3GKgNFrgDDvnueV138SL_weH1dvJpaLBWGDdw0JvNjR-nEJew9aj3BbnrMaijpOjYE6I_dV2r8KO-rUOy_H30QrsghyNjRYfHrQahmAvC-GkiqNmqcFakDQChr_vO9blQ44belskfg2uAeq81QasoLsh7lJtnr_MVXLhSdvu9DcnjCXMciWBnyRgMCuS949kRGxBXb7RsbVox00XI&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&c_v=1784_1_0_0_0&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.4.121 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-4-121.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:12 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
bridge3.348.2_en.html
imasdk.googleapis.com/js/core/ Frame D2DD
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.348.2_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.348.2_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
194814
date
Tue, 05 Nov 2019 04:10:14 GMT
expires
Wed, 04 Nov 2020 04:10:14 GMT
last-modified
Tue, 05 Nov 2019 04:05:57 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
93478
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame 8D10
26 KB
10 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81a::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 06:08:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Wed, 06 Nov 2019 06:08:12 GMT
integrator.js
adservice.google.com/adsid/ Frame 8D10
122 B
184 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.computerworld.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:818::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
8c6f6fd21ce92ecd6631160cd4464543c34f96113348eda3ea6de3d32052e592
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 06 Nov 2019 06:08:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
117
x-xss-protection
0
vwt
trk.connatix.com/ Frame 8D10
0
162 B
Image
General
Full URL
https://trk.connatix.com/vwt?connatix_sess=Gqme1a7l6QNBFoe3kXx0dFUDPqEVWwdsuPVBw1RImW6T4OXC-OOph15rm9SJW0XZ7hijBRudtZWFosLatmM4zS4XMXM2uPNQDXeVrEGfDGDK3dkufL8D_kJ4aa257vGnLR5Rv1y3nvZgAiCw_O88i84-1O1-ccPDrNU8N8SkhzcYrdLxD5_leEPgHRqZbQQ3&c_vid=934153&c_pl=3hi9YlPNBIo73Cxid5l6v2XwHc3GKgNFrgDDvnueV138SL_weH1dvJpaLBWGDdw0JvNjR-nEJew9aj3BbnrMaijpOjYE6I_dV2r8KO-rUOy_H30QrsghyNjRYfHrQahmAvC-GkiqNmqcFakDQChr_vO9blQ44belskfg2uAeq81QasoLsh7lJtnr_MVXLhSdvu9DcnjCXMciWBnyRgMCuS949kRGxBXb7RsbVox00XI&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&c_v=1784_1_0_0_0&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.4.121 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-4-121.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:12 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
sbt.js
static.vidazoo.com/basev/1.0.318/
520 KB
116 KB
Script
General
Full URL
https://static.vidazoo.com/basev/1.0.318/sbt.js
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/vpt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
49ba60514d84fa0a60e032fca86466b915430eb4ed84984f2fe9190ea731af7d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:12 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 17:44:50 GMT
ETag
"1572975890"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=41810
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
118284
X-HW
1573020491.dop040.fr8.shc,1573020492.dop040.fr8.t,1573020492.cds018.fr8.c
1_360_1.mp4
v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/
384 KB
0
Media
General
Full URL
https://v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/1_360_1.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Range
bytes=0-

Response headers

x-amz-version-id
1YaqZC7.gjT3DeqS5u_Mw8fNPN8xlWes
via
1.1 varnish, 1.1 varnish
etag
"cc1120ad618b42d4141faea4ef590f1b"
age
80758
x-cache
HIT, HIT
status
206
content-length
12587798
x-served-by
cache-sjc3124-SJC, cache-fra19183-FRA
content-range
bytes 0-12587797/12587798
last-modified
Tue, 05 Nov 2019 07:34:05 GMT
x-timer
S1573020493.757119,VS0,VE0
date
Wed, 06 Nov 2019 06:08:12 GMT
content-type
video/mp4
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes, bytes
x-cache-hits
0, 0
1_0.vtt
v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/
4 KB
5 KB
TextTrack
General
Full URL
https://v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/1_0.vtt
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
df8e16634ce4c5757a7a8d4f9abb7401ee1a27856b5e1c12ed9116294996d870

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
IM0J3rnA_zfvCu.tuivjguYKy8.R1oFc
via
1.1 varnish, 1.1 varnish
etag
"5d08431280c46e8e5c33409b7069fcf8"
age
72419
x-cache
HIT, HIT
status
200
content-length
4444
x-served-by
cache-sjc3136-SJC, cache-fra19183-FRA
last-modified
Tue, 05 Nov 2019 07:31:38 GMT
x-timer
S1573020493.760812,VS0,VE0
date
Wed, 06 Nov 2019 06:08:12 GMT
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes
x-cache-hits
2, 1
bridge3.348.2_en.html
imasdk.googleapis.com/js/core/ Frame 64E5
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.348.2_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.348.2_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
194814
date
Tue, 05 Nov 2019 04:10:14 GMT
expires
Wed, 04 Nov 2020 04:10:14 GMT
last-modified
Tue, 05 Nov 2019 04:05:57 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
93478
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
d9e4b806-5d92-4e27-9baa-7b5e1934d588
https://www.computerworld.com/
1 KB
0
Other
General
Full URL
blob:https://www.computerworld.com/d9e4b806-5d92-4e27-9baa-7b5e1934d588
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ee441245ef85f538030acf5e534d1cf2664c18289cec8cc0d84656ffb0e0a95d

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Length
1205
a4a6b9fa-8475-4260-9275-513d761a01d8
https://www.computerworld.com/
1 KB
0
Other
General
Full URL
blob:https://www.computerworld.com/a4a6b9fa-8475-4260-9275-513d761a01d8
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8e920612ce29a3290fc2edbaab7647470f21dda35cc1a350f9b8b362fc4d3ebe

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Length
1515
outbrain.js
static.vidazoo.com/basev/skins/outbrain/
65 KB
19 KB
Script
General
Full URL
https://static.vidazoo.com/basev/skins/outbrain/outbrain.js
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
fed94ed7a6761a28c636099bc32eb47cc0ac48bae44f7cf99604b839c1ff1fab

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:12 GMT
Content-Encoding
gzip
Last-Modified
Wed, 04 Sep 2019 17:00:59 GMT
ETag
"1567616459"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=27889
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
18975
X-HW
1573020491.dop040.fr8.shc,1573020492.dop040.fr8.t,1573020492.cds018.fr8.c
vwt
trk.connatix.com/ Frame 8D10
0
162 B
Image
General
Full URL
https://trk.connatix.com/vwt?c_pl=3hi9YlPNBIo73Cxid5l6v2XwHc3GKgNFrgDDvnueV138SL_weH1dvJpaLBWGDdw0JvNjR-nEJew9aj3BbnrMaijpOjYE6I_dV2r8KO-rUOy_H30QrsghyNjRYfHrQahmAvC-GkiqNmqcFakDQChr_vO9blQ44belskfg2uAeq81QasoLsh7lJtnr_MVXLhSdvu9DcnjCXMciWBnyRgMCuS949kRGxBXb7RsbVox00XI&id_cl=7a2f4f985fd0cfdd9a211573020492903&c_vid=934153&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&c_v=1784_1_0_0_0&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.4.121 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-4-121.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:12 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
truncated
/
2 KB
2 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c27b11a4844614f6d6e987fa8f18ff24e12f59abe2972869509f57f92bdac135

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Origin
https://www.computerworld.com

Response headers

Content-Type
application/x-font-ttf;charset=utf-8
prebid.js
static.vidazoo.com/basev/prebid/ Frame 8539
250 KB
80 KB
Script
General
Full URL
https://static.vidazoo.com/basev/prebid/prebid.js
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
d9d09c199ddc98c21c53d0a8ae899f01a24edb120d295c124cca6f096500d982

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:13 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 10:56:10 GMT
ETag
"1572951370"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=27888
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
80772
X-HW
1573020491.dop040.fr8.shc,1573020492.dop040.fr8.t,1573020493.cds018.fr8.c
loader.gif
libs.sphere.com/video/outbrain-player/assets/
51 KB
51 KB
Image
General
Full URL
https://libs.sphere.com/video/outbrain-player/assets/loader.gif
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.250 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-250.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
d05d164843ec0e47ddf7fca61f0e4bed73c23280c7eeb0fd0e9dc0c618b8eb90

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:13 GMT
Last-Modified
Sun, 17 Dec 2017 09:28:08 GMT
Server
Apache
ETag
"c753233e9ae7214419baca2aedd1c4b9:1513502888"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/gif
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
true
Connection
keep-alive
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Content-Length
52226
frame
vastcdn.outbrain.com/ Frame F0D8
0
0
Document
General
Full URL
https://vastcdn.outbrain.com/frame?h=https%3A%2F%2Fwww.computerworld.com&id=obd2f133-318b-2a57-e5f6-bd8453595aff&url=https%3A%2F%2Frtr.innovid.com%2Fr1.5d259b75d6a577.80095753%3FobOrigUrl%3Dtrue
Requested by
Host: libs.sphere.com
URL: https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:10c:396::2a83 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Host
vastcdn.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Accept-Encoding
gzip, deflate, br
Cookie
obuid=8ae25202-b8d1-4e5c-8661-8de7cb68ea53; recs_e05a921dcf412ea4536b468a15c12d30=0B2395937617A1925901673A2229989104A2355440387A2212391210A2417301361AC2B2361454795A2435535374ACD1
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809

Response headers

Content-Type
text/html; charset=utf-8
ETag
W/"10ff-EKDAzViREYP9ss+PJV9EvDtEXDc"
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Content-Length
1430
Vary
Accept-Encoding
Cache-Control
max-age=3600
Expires
Wed, 06 Nov 2019 07:08:13 GMT
Date
Wed, 06 Nov 2019 06:08:13 GMT
Connection
keep-alive
5a9fcd5bfe8d0f00047aaceb.mp4
inventory.vidazoo.com/5a9ea5a0225f7d0004c70045/5a9fcd5bfe8d0f00047aaceb/
6 KB
7 KB
Media
General
Full URL
https://inventory.vidazoo.com/5a9ea5a0225f7d0004c70045/5a9fcd5bfe8d0f00047aaceb/5a9fcd5bfe8d0f00047aaceb.mp4
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.42 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
dbeb404d326e6051a0182a90d654ea370f8c1ed0684f523c1f722447787d56d6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Range
bytes=0-

Response headers

Date
Wed, 06 Nov 2019 06:08:13 GMT
Content-Range
bytes 0-5955/5956
Last-Modified
Wed, 07 Mar 2018 11:30:44 GMT
ETag
"1520422244"
X-HW
1573020493.dop097.fr8.shc,1573020493.dop097.fr8.t,1573020493.cds120.fr8.c
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
public, max-age=86400
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
video/mp4
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
5956
csi
csi.gstatic.com/ Frame 8D10
0
56 B
Other
General
Full URL
https://csi.gstatic.com/csi?v=2&s=ima&dmc=8&puid=1~k2mvsc2v&c=6085380225829&slotId=3042690112914.5&eee=missing-element&bi=missing-id
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4001:807::2003 , Australia, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 06:08:13 GMT
last-modified
Wed, 21 Jan 2004 19:51:30 GMT
server
Golfe2
status
204
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
videoplayback
r3---sn-4g5ednsl.googlevideo.com/
Redirect Chain
  • https://r3---sn-4g5e6nlk.googlevideo.com/videoplayback?id=ec65ebd68eec3634&itag=22&source=youtube&requiressl=yes&mm=31&mn=sn-4g5e6nlk&ms=au&mv=m&mvi=2&pl=22&ei=TWPCXevYEsrt-gakwreQBg&susc=gvp&acao=...
  • https://r3---sn-4g5ednsl.googlevideo.com/videoplayback?id=ec65ebd68eec3634&itag=22&source=youtube&requiressl=yes&mvi=2&pl=41&ei=TWPCXevYEsrt-gakwreQBg&susc=gvp&acao=yes&mime=video%2Fmp4&dur=6.060&l...
746 KB
746 KB
Media
General
Full URL
https://r3---sn-4g5ednsl.googlevideo.com/videoplayback?id=ec65ebd68eec3634&itag=22&source=youtube&requiressl=yes&mvi=2&pl=41&ei=TWPCXevYEsrt-gakwreQBg&susc=gvp&acao=yes&mime=video%2Fmp4&dur=6.060&lmt=1569581278085782&txp=2216222&ip=144.76.109.30&ipbits=0&expire=1573049293&sparams=acao,dur,ei,expire,id,ip,ipbits,ipbypass,itag,lmt,mime,mip,mm,mn,ms,mv,mvi,pl,requiressl,source,susc&signature=7425F73026D976FB1332758BB2670E5D66346E4F.0DF27DFAFA5874F2D56EC97185BA37E1D630ABCF&key=cms1&cpn=V3ixKddqvrkMl236&redirect_counter=1&rm=sn-4g5esk7s&fexp=23812954&req_id=7f9f2cc4f14236e2&cms_redirect=yes&ipbypass=yes&mip=2a01:4f8:192:5414::2&mm=31&mn=sn-4g5ednsl&ms=au&mt=1573020386&mv=m
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:6a::8 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
gvs 1.0 /
Resource Hash
2e425e7c7a26d0995f9bdc88a68deef2d5afc6942aaab351ad8bc938b4e873fe
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:13 GMT
X-Content-Type-Options
nosniff
Last-Modified
Fri, 27 Sep 2019 10:47:58 GMT
Server
gvs 1.0
Content-Type
video/mp4
Content-Range
bytes 0-763774/763775
Cache-Control
private, max-age=28500
Connection
close
Accept-Ranges
bytes
Alt-Svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
Content-Length
763775
Expires
Wed, 06 Nov 2019 06:08:13 GMT

Redirect headers

Date
Wed, 06 Nov 2019 06:08:13 GMT
X-Content-Type-Options
nosniff
Last-Modified
Wed, 02 May 2007 10:26:10 GMT
Server
gvs 1.0
Content-Type
text/html
Location
https://r3---sn-4g5ednsl.googlevideo.com/videoplayback?id=ec65ebd68eec3634&itag=22&source=youtube&requiressl=yes&mvi=2&pl=41&ei=TWPCXevYEsrt-gakwreQBg&susc=gvp&acao=yes&mime=video%2Fmp4&dur=6.060&lmt=1569581278085782&txp=2216222&ip=144.76.109.30&ipbits=0&expire=1573049293&sparams=acao,dur,ei,expire,id,ip,ipbits,ipbypass,itag,lmt,mime,mip,mm,mn,ms,mv,mvi,pl,requiressl,source,susc&signature=7425F73026D976FB1332758BB2670E5D66346E4F.0DF27DFAFA5874F2D56EC97185BA37E1D630ABCF&key=cms1&cpn=V3ixKddqvrkMl236&redirect_counter=1&rm=sn-4g5esk7s&fexp=23812954&req_id=7f9f2cc4f14236e2&cms_redirect=yes&ipbypass=yes&mip=2a01:4f8:192:5414::2&mm=31&mn=sn-4g5ednsl&ms=au&mt=1573020386&mv=m
Cache-Control
private, max-age=900
Connection
close
Content-Length
0
Expires
Wed, 06 Nov 2019 06:08:13 GMT
p
sb.scorecardresearch.com/ Frame 8D10
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=1&ns_st_sp=1&ns_st_sc=1&ns_st_psq=1&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=play&ns_st_po=0&ns_st_cl=189000&ns_st_pb=1&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=0&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=0&ns_st_det=0&ns_st_upc=0&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=0&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=0&ns_st_dlpc=0&ns_st_lpa=0&ns_st_dlpa=0&ns_st_pa=0&ns_ts=1573020493421&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_lt=1&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=0&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c8=&c9=&cs_ucfr=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 06:08:13 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 01 Jan 1990 00:00:00 GMT
truncated
/
175 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
67ea46bc3d15351067faccb3613bd833dd3f15137a4b4a09f2e873fd41d024d2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/png
impression
trk.connatix.com/
338 B
492 B
Script
General
Full URL
https://trk.connatix.com/impression?c_aid=13455&c_mt=ima&connatix_sess=Gqme1a7l6QNBFoe3kXx0dFUDPqEVWwdsuPVBw1RImW6T4OXC-OOph15rm9SJW0XZ7hijBRudtZWFosLatmM4zS4XMXM2uPNQDXeVrEGfDGDK3dkufL8D_kJ4aa257vGnLR5Rv1y3nvZgAiCw_O88i84-1O1-ccPDrNU8N8SkhzcYrdLxD5_leEPgHRqZbQQ3&c_ph=225&c_pw=400&c_vid=934153&c_wt=753&c_wc=2&c_rc=2&c_tad=1&c_adp=0&c_pl=3hi9YlPNBIo73Cxid5l6v2XwHc3GKgNFrgDDvnueV138SL_weH1dvJpaLBWGDdw0JvNjR-nEJew9aj3BbnrMaijpOjYE6I_dV2r8KO-rUOy_H30QrsghyNjRYfHrQahmAvC-GkiqNmqcFakDQChr_vO9blQ44belskfg2uAeq81QasoLsh7lJtnr_MVXLhSdvu9DcnjCXMciWBnyRgMCuS949kRGxBXb7RsbVox00XI&id_cl=7a2f4f985fd0cfdd9a211573020492903&id_va=bc4e06b8a2559c14aba31573020493530&c_v=1784_1_0_0_0&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&spp=1&xplt=true&callback=cnxJSONP_1bd718bb94cf9631b9eb1573020493530
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1784/min/connatix.renderer.infeed.min_dc.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.4.121 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-4-121.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
3288b39e06925075538082ec50b4e6ccf7d1be9a0143d885c179256a78189031

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:13 GMT
Content-Encoding
gzip
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
304
p
sb.scorecardresearch.com/ Frame 8D10
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=2&ns_st_sp=1&ns_st_sc=1&ns_st_psq=1&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=pause&ns_st_po=114&ns_st_cl=189000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=114&ns_st_dpt=114&ns_st_ipt=114&ns_st_et=114&ns_st_det=114&ns_st_upc=114&ns_st_dupc=114&ns_st_iupc=114&ns_st_upa=114&ns_st_dupa=114&ns_st_iupa=114&ns_st_lpc=114&ns_st_dlpc=114&ns_st_lpa=114&ns_st_dlpa=114&ns_st_pa=114&ns_ts=1573020493535&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=1&ns_st_pp=1&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c8=&c9=&cs_ucfr=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 06:08:13 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 01 Jan 1990 00:00:00 GMT
p
sb.scorecardresearch.com/ Frame 8D10
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_psq=1&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=end&ns_st_po=114&ns_st_cl=189000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=114&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=115&ns_st_det=1&ns_st_upc=114&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=114&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=114&ns_st_dlpc=0&ns_st_lpa=114&ns_st_dlpa=0&ns_st_pa=114&ns_ts=1573020493536&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=0&ns_st_pp=1&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c8=&c9=&cs_ucfr=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 06:08:13 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 01 Jan 1990 00:00:00 GMT
p
sb.scorecardresearch.com/ Frame 8D10
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=4&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=play&ns_st_po=0&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=0&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=0&ns_st_det=0&ns_st_upc=0&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=0&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=0&ns_st_dlpc=0&ns_st_lpa=0&ns_st_dlpa=0&ns_st_pa=114&ns_ts=1573020493537&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=1&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c8=&c9=&cs_ucfr=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 06:08:13 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 01 Jan 1990 00:00:00 GMT
vwt
trk.connatix.com/ Frame 8D10
0
162 B
Image
General
Full URL
https://trk.connatix.com/vwt?c_pl=3hi9YlPNBIo73Cxid5l6v2XwHc3GKgNFrgDDvnueV138SL_weH1dvJpaLBWGDdw0JvNjR-nEJew9aj3BbnrMaijpOjYE6I_dV2r8KO-rUOy_H30QrsghyNjRYfHrQahmAvC-GkiqNmqcFakDQChr_vO9blQ44belskfg2uAeq81QasoLsh7lJtnr_MVXLhSdvu9DcnjCXMciWBnyRgMCuS949kRGxBXb7RsbVox00XI&id_cl=7a2f4f985fd0cfdd9a211573020492903&id_va=bc4e06b8a2559c14aba31573020493530&c_v=1784_1_0_0_0&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.4.121 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-4-121.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:13 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
play_100x100.png
widgets.outbrain.com/images/widgetIcons/
9 KB
10 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/play_100x100.png
Requested by
Host: libs.sphere.com
URL: https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.234.190 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-234-190.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
bbcd8c21e24392c2c8ef2c5df39578e95b2bff035be4930cbc53b996087783a6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:13 GMT
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"25a69b3019e3b959aef033482762080f:1572966031"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
9422
tracking.png
trk.connatix.com/ Frame 8D10
0
162 B
Image
General
Full URL
https://trk.connatix.com/tracking.png?connatix_sess=bxYHUFTqdZVM1B9f1hdEwVcgPM8aLWwWRxkH6m-eWiOQBZXjIow2S4cId_Xt2IfxaklFdBSXFf4mmPtQzD-HeaCu0E6IUlGWvKioyHjoqmZ_hNCYjC-pZxuyn0e568hsN8Hjy4bacW2heR5ZdzCisWIPlVq_81KKDHtH8_5ONSuE3XSi1Cp1Bf--az7qok3X&c_aid=13455&c_vid=934153&cb=044e75c9d617f1fe98e21573020495270&quartile=1&c_v=1784_1_0_0_0&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.4.121 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-4-121.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:15 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
qt
trk.connatix.com/ Frame 8D10
0
162 B
Image
General
Full URL
https://trk.connatix.com/qt?c_q=1&c_pl=3hi9YlPNBIo73Cxid5l6v2XwHc3GKgNFrgDDvnueV138SL_weH1dvJpaLBWGDdw0JvNjR-nEJew9aj3BbnrMaijpOjYE6I_dV2r8KO-rUOy_H30QrsghyNjRYfHrQahmAvC-GkiqNmqcFakDQChr_vO9blQ44belskfg2uAeq81QasoLsh7lJtnr_MVXLhSdvu9DcnjCXMciWBnyRgMCuS949kRGxBXb7RsbVox00XI&id_cl=7a2f4f985fd0cfdd9a211573020492903&id_va=bc4e06b8a2559c14aba31573020493530&c_v=1784_1_0_0_0&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.4.121 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-4-121.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:15 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
tracking.png
trk.connatix.com/ Frame 8D10
0
162 B
Image
General
Full URL
https://trk.connatix.com/tracking.png?connatix_sess=bxYHUFTqdZVM1B9f1hdEwVcgPM8aLWwWRxkH6m-eWiOQBZXjIow2S4cId_Xt2IfxaklFdBSXFf4mmPtQzD-HeaCu0E6IUlGWvKioyHjoqmZ_hNCYjC-pZxuyn0e568hsN8Hjy4bacW2heR5ZdzCisWIPlVq_81KKDHtH8_5ONSuE3XSi1Cp1Bf--az7qok3X&c_aid=13455&c_vid=934153&cb=ce561fbfb3d3b68e5fea1573020496770&quartile=2&c_v=1784_1_0_0_0&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.4.121 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-4-121.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:16 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
qt
trk.connatix.com/ Frame 8D10
0
162 B
Image
General
Full URL
https://trk.connatix.com/qt?c_q=2&c_pl=3hi9YlPNBIo73Cxid5l6v2XwHc3GKgNFrgDDvnueV138SL_weH1dvJpaLBWGDdw0JvNjR-nEJew9aj3BbnrMaijpOjYE6I_dV2r8KO-rUOy_H30QrsghyNjRYfHrQahmAvC-GkiqNmqcFakDQChr_vO9blQ44belskfg2uAeq81QasoLsh7lJtnr_MVXLhSdvu9DcnjCXMciWBnyRgMCuS949kRGxBXb7RsbVox00XI&id_cl=7a2f4f985fd0cfdd9a211573020492903&id_va=bc4e06b8a2559c14aba31573020493530&c_v=1784_1_0_0_0&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.4.121 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-4-121.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:16 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
2 KB
2 KB
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&bcsessionid=&bctempid=&overruleReferrer=&time=2019-11-06T07%3A08%3A17%2B01%3A00&ts=1573020497944
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.20.228.30 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-23-20-228-30.compute-1.amazonaws.com
Software
- /
Resource Hash
e255604ce0846b85df235b3ad54a5f3f471385b9343d19d4c4d401e7280238b5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 06:08:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
914
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
tracking.png
trk.connatix.com/ Frame 8D10
0
162 B
Image
General
Full URL
https://trk.connatix.com/tracking.png?connatix_sess=bxYHUFTqdZVM1B9f1hdEwVcgPM8aLWwWRxkH6m-eWiOQBZXjIow2S4cId_Xt2IfxaklFdBSXFf4mmPtQzD-HeaCu0E6IUlGWvKioyHjoqmZ_hNCYjC-pZxuyn0e568hsN8Hjy4bacW2heR5ZdzCisWIPlVq_81KKDHtH8_5ONSuE3XSi1Cp1Bf--az7qok3X&c_aid=13455&c_vid=934153&cb=0913507c11e5e30638911573020498270&quartile=3&c_v=1784_1_0_0_0&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.4.121 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-4-121.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:18 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
qt
trk.connatix.com/ Frame 8D10
0
162 B
Image
General
Full URL
https://trk.connatix.com/qt?c_q=3&c_pl=3hi9YlPNBIo73Cxid5l6v2XwHc3GKgNFrgDDvnueV138SL_weH1dvJpaLBWGDdw0JvNjR-nEJew9aj3BbnrMaijpOjYE6I_dV2r8KO-rUOy_H30QrsghyNjRYfHrQahmAvC-GkiqNmqcFakDQChr_vO9blQ44belskfg2uAeq81QasoLsh7lJtnr_MVXLhSdvu9DcnjCXMciWBnyRgMCuS949kRGxBXb7RsbVox00XI&id_cl=7a2f4f985fd0cfdd9a211573020492903&id_va=bc4e06b8a2559c14aba31573020493530&c_v=1784_1_0_0_0&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.4.121 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-4-121.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:18 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
tracking.png
trk.connatix.com/ Frame 8D10
0
162 B
Image
General
Full URL
https://trk.connatix.com/tracking.png?connatix_sess=bxYHUFTqdZVM1B9f1hdEwVcgPM8aLWwWRxkH6m-eWiOQBZXjIow2S4cId_Xt2IfxaklFdBSXFf4mmPtQzD-HeaCu0E6IUlGWvKioyHjoqmZ_hNCYjC-pZxuyn0e568hsN8Hjy4bacW2heR5ZdzCisWIPlVq_81KKDHtH8_5ONSuE3XSi1Cp1Bf--az7qok3X&c_aid=13455&c_vid=934153&cb=f20213f1f8c7426615221573020499634&quartile=4&c_v=1784_1_0_0_0&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.4.121 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-4-121.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:19 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
qt
trk.connatix.com/ Frame 8D10
0
162 B
Image
General
Full URL
https://trk.connatix.com/qt?c_q=4&c_pl=3hi9YlPNBIo73Cxid5l6v2XwHc3GKgNFrgDDvnueV138SL_weH1dvJpaLBWGDdw0JvNjR-nEJew9aj3BbnrMaijpOjYE6I_dV2r8KO-rUOy_H30QrsghyNjRYfHrQahmAvC-GkiqNmqcFakDQChr_vO9blQ44belskfg2uAeq81QasoLsh7lJtnr_MVXLhSdvu9DcnjCXMciWBnyRgMCuS949kRGxBXb7RsbVox00XI&id_cl=7a2f4f985fd0cfdd9a211573020492903&id_va=bc4e06b8a2559c14aba31573020493530&c_v=1784_1_0_0_0&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.202.4.121 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-202-4-121.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 06:08:19 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
p2
sb.scorecardresearch.com/ Frame 8D10
Redirect Chain
  • https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=5&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_...
  • https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=5&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns...
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=5&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=pause&ns_st_po=6098&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=6098&ns_st_dpt=6098&ns_st_ipt=6098&ns_st_et=6098&ns_st_det=6098&ns_st_upc=6098&ns_st_dupc=6098&ns_st_iupc=6098&ns_st_upa=6098&ns_st_dupa=6098&ns_st_iupa=6098&ns_st_lpc=6098&ns_st_dlpc=6098&ns_st_lpa=6098&ns_st_dlpa=6098&ns_st_pa=6212&ns_ts=1573020499635&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=1&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c8=&c9=&cs_ucfr=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 06:08:19 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=5&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=pause&ns_st_po=6098&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=6098&ns_st_dpt=6098&ns_st_ipt=6098&ns_st_et=6098&ns_st_det=6098&ns_st_upc=6098&ns_st_dupc=6098&ns_st_iupc=6098&ns_st_upa=6098&ns_st_dupa=6098&ns_st_iupa=6098&ns_st_lpc=6098&ns_st_dlpc=6098&ns_st_lpa=6098&ns_st_dlpa=6098&ns_st_pa=6212&ns_ts=1573020499635&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=1&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c8=&c9=&cs_ucfr=0
Pragma
no-cache
Date
Wed, 06 Nov 2019 06:08:19 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
p2
sb.scorecardresearch.com/ Frame 8D10
Redirect Chain
  • https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=6&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_...
  • https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=6&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns...
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=6&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=end&ns_st_po=6098&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=6098&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=6098&ns_st_det=0&ns_st_upc=6098&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=6098&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=6098&ns_st_dlpc=0&ns_st_lpa=6098&ns_st_dlpa=0&ns_st_pa=6212&ns_ts=1573020499635&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=0&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c8=&c9=&cs_ucfr=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 06:08:19 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=6&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=end&ns_st_po=6098&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=6098&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=6098&ns_st_det=0&ns_st_upc=6098&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=6098&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=6098&ns_st_dlpc=0&ns_st_lpa=6098&ns_st_dlpa=0&ns_st_pa=6212&ns_ts=1573020499635&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=0&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c8=&c9=&cs_ucfr=0
Pragma
no-cache
Date
Wed, 06 Nov 2019 06:08:19 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
p2
sb.scorecardresearch.com/ Frame 8D10
Redirect Chain
  • https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=7&ns_st_sp=1&ns...
  • https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=7&ns_st_sp=1&n...
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=7&ns_st_sp=1&ns_st_sc=2&ns_st_psq=3&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=2&ns_st_spc=2&ns_st_cn=1&ns_st_ev=play&ns_st_po=0&ns_st_cl=189000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=0&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=0&ns_st_det=0&ns_st_upc=114&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=0&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=114&ns_st_dlpc=0&ns_st_lpa=0&ns_st_dlpa=0&ns_st_pa=6212&ns_ts=1573020499636&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c8=&c9=&cs_ucfr=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.19.43.224 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-19-43-224.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 06:08:19 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573020493420&ns_st_ec=7&ns_st_sp=1&ns_st_sc=2&ns_st_psq=3&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=2&ns_st_spc=2&ns_st_cn=1&ns_st_ev=play&ns_st_po=0&ns_st_cl=189000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=0&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=0&ns_st_det=0&ns_st_upc=114&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=0&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=114&ns_st_dlpc=0&ns_st_lpa=0&ns_st_dlpa=0&ns_st_pa=6212&ns_ts=1573020499636&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DDescription%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106060809&c8=&c9=&cs_ucfr=0
Pragma
no-cache
Date
Wed, 06 Nov 2019 06:08:19 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
1_360_1.mp4
v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/
64 KB
0
Media
General
Full URL
https://v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/1_360_1.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Range
bytes=393216-

Response headers

x-amz-version-id
1YaqZC7.gjT3DeqS5u_Mw8fNPN8xlWes
via
1.1 varnish, 1.1 varnish
etag
"cc1120ad618b42d4141faea4ef590f1b"
age
80765
x-cache
HIT, HIT
status
206
content-length
12194582
x-served-by
cache-sjc3124-SJC, cache-fra19183-FRA
content-range
bytes 393216-12587797/12587798
last-modified
Tue, 05 Nov 2019 07:34:05 GMT
x-timer
S1573020500.866959,VS0,VE0
date
Wed, 06 Nov 2019 06:08:19 GMT
content-type
video/mp4
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes, bytes
x-cache-hits
0, 0
1_360_1.mp4
v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/
64 KB
0
Media
General
Full URL
https://v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/1_360_1.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Range
bytes=458752-

Response headers

x-amz-version-id
1YaqZC7.gjT3DeqS5u_Mw8fNPN8xlWes
via
1.1 varnish, 1.1 varnish
etag
"cc1120ad618b42d4141faea4ef590f1b"
age
80765
x-cache
HIT, HIT
status
206
content-length
12129046
x-served-by
cache-sjc3124-SJC, cache-fra19183-FRA
content-range
bytes 458752-12587797/12587798
last-modified
Tue, 05 Nov 2019 07:34:05 GMT
x-timer
S1573020501.500940,VS0,VE0
date
Wed, 06 Nov 2019 06:08:20 GMT
content-type
video/mp4
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes, bytes
x-cache-hits
0, 0
auction
prebid-server.rubiconproject.com/openrtb2/ Frame 8539
141 B
367 B
XHR
General
Full URL
https://prebid-server.rubiconproject.com/openrtb2/auction
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/prebid/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.59.120.88 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-59-120-88.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
61394655176705013e598f15d4f9b42fcb47b030c3b154f4ce07fcfe5c4fd797

Request headers

Sec-Fetch-Mode
cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 06:08:21 GMT
content-encoding
gzip
status
200
content-type
application/json
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-length
148
expires
0
directsdk.js
aka.spotxcdn.com/integration/directsdk/v1/
Redirect Chain
  • https://js.spotx.tv/directsdk/v1/265228.js
  • https://aka.spotxcdn.com/integration/directsdk/v1/directsdk.js
391 KB
145 KB
Script
General
Full URL
https://aka.spotxcdn.com/integration/directsdk/v1/directsdk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.232.234 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-234.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
de40791a97231d95b94dd9535759ae5b1e7ae0ccf83362951337862307c820fe

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:21 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Oct 2019 21:14:16 UTC
Server
nginx
Access-Control-Allow-Headers
ETag
2ae6c9a6b809a0e4036614b5182b0d5a
Vary
Accept-Encoding
Access-Control-Allow-Methods
POST, GET, PATCH, DELETE, OPTIONS
Content-Type
text/javascript;charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=137
Connection
keep-alive
Timing-Allow-Origin
*
X-SpotX-Build-Version
1.30.0-20191022.2011
Content-Length
147920

Redirect headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 06:08:21 GMT
Last-Modified
Wed, 06 Nov 2019 06:08:21 UTC
Server
nginx
Location
//aka.spotxcdn.com/integration/directsdk/v1/directsdk.js
Access-Control-Allow-Methods
GET, POST, OPTIONS
Content-Type
text/plain
Access-Control-Allow-Origin
*
Cache-Control
post-check=0, pre-check=0, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0
Access-Control-Allow-Credentials
false
X-fe
2
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
prebid.js
static.vidazoo.com/basev/prebid/ Frame 50DC
250 KB
80 KB
Script
General
Full URL
https://static.vidazoo.com/basev/prebid/prebid.js
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
d9d09c199ddc98c21c53d0a8ae899f01a24edb120d295c124cca6f096500d982

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:21 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 10:56:10 GMT
ETag
"1572951370"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=27880
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
80772
X-HW
1573020491.dop040.fr8.shc,1573020492.dop040.fr8.t,1573020501.cds018.fr8.c
prebid.js
static.vidazoo.com/basev/prebid/ Frame 0C3D
250 KB
80 KB
Script
General
Full URL
https://static.vidazoo.com/basev/prebid/prebid.js
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
d9d09c199ddc98c21c53d0a8ae899f01a24edb120d295c124cca6f096500d982

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:21 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 10:56:10 GMT
ETag
"1572951370"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=27880
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
80772
X-HW
1573020491.dop040.fr8.shc,1573020492.dop040.fr8.t,1573020501.cds018.fr8.c
prebid.js
static.vidazoo.com/basev/prebid/ Frame F8FC
250 KB
80 KB
Script
General
Full URL
https://static.vidazoo.com/basev/prebid/prebid.js
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
d9d09c199ddc98c21c53d0a8ae899f01a24edb120d295c124cca6f096500d982

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:21 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 10:56:10 GMT
ETag
"1572951370"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=17269
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
80772
X-HW
1573020501.dop040.fr8.shc,1573020501.dop040.fr8.t,1573020501.cds096.fr8.c
prebid.js
static.vidazoo.com/basev/prebid/ Frame 703E
250 KB
80 KB
Script
General
Full URL
https://static.vidazoo.com/basev/prebid/prebid.js
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
d9d09c199ddc98c21c53d0a8ae899f01a24edb120d295c124cca6f096500d982

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 06:08:21 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 10:56:10 GMT
ETag
"1572951370"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=17269
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
80772
X-HW
1573020501.dop040.fr8.shc,1573020501.dop040.fr8.t,1573020501.cds096.fr8.c
usync.html
eus.rubiconproject.com/ Frame A0CF
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/prebid/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.78.125 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-78-125.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Mon, 04 Nov 2019 18:36:50 GMT
Content-Encoding
gzip
Content-Length
7530
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=84261
Expires
Thu, 07 Nov 2019 05:32:42 GMT
Date
Wed, 06 Nov 2019 06:08:21 GMT
Connection
keep-alive
Vary
Accept-Encoding
1_360_1.mp4
v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/
64 KB
0
Media
General
Full URL
https://v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/1_360_1.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Range
bytes=524288-

Response headers

x-amz-version-id
1YaqZC7.gjT3DeqS5u_Mw8fNPN8xlWes
via
1.1 varnish, 1.1 varnish
etag
"cc1120ad618b42d4141faea4ef590f1b"
age
80766
x-cache
HIT, HIT
status
206
content-length
12063510
x-served-by
cache-sjc3124-SJC, cache-fra19183-FRA
content-range
bytes 524288-12587797/12587798
last-modified
Tue, 05 Nov 2019 07:34:05 GMT
x-timer
S1573020501.341464,VS0,VE0
date
Wed, 06 Nov 2019 06:08:21 GMT
content-type
video/mp4
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes, bytes
x-cache-hits
0, 0
digitrust.min.js
cdn.digitru.st/prod/1/
40 KB
11 KB
Script
General
Full URL
https://cdn.digitru.st/prod/1/digitrust.min.js
Requested by
Host: aka.spotxcdn.com
URL: https://aka.spotxcdn.com/integration/directsdk/v1/directsdk.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
159.180.84.2 , United States, ASN33047 (INSTART - Instart Logic, Inc, US),
Reverse DNS
Software
DTOrigin /
Resource Hash
26ca840c9d02b5b4c1013bf1e2371ff3e04dea1fb2dc7b60cc7d21345359938d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 20:07:05 GMT
content-encoding
gzip
last-modified
Mon, 23 Sep 2019 14:27:17 GMT
server
DTOrigin
etag
"651f6d3b36aa4bd56fedba685427757f"
status
200
p3p
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
access-control-allow-origin
*
cache-control
max-age=86400
x-instart-request-id
2203102434074759679:SEN01-CPVNPPRY16:1573020501:0
x-instart-cache-id
15:13010803099792070398::1572984424
accept-ranges
bytes
content-type
application/javascript
content-length
11230
expires
Wed, 06 Nov 2019 20:07:05 GMT
partner
sync.search.spotxchange.com/
Redirect Chain
  • https://sync.search.spotxchange.com/partner?source=dados
  • https://sync.search.spotxchange.com/partner?source=dados&__user_check__=1&sync_id=d5a7ce66-005b-11ea-8984-173c25ca0a06
0
563 B
Image
General
Full URL
https://sync.search.spotxchange.com/partner?source=dados&__user_check__=1&sync_id=d5a7ce66-005b-11ea-8984-173c25ca0a06
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.94.180.126 , Netherlands, ASN35220 (SPOTX-AMS, NL),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-spotx-halt-type
Audience Dsp sync Priority Sync endpoint Source ID is not on enabled source whitelist
Date
Wed, 06 Nov 2019 06:08:21 GMT
Server
nginx
Access-Control-Allow-Methods
GET, POST, OPTIONS
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0
Access-Control-Allow-Credentials
false
X-fe
117
Connection
keep-alive
Content-Length
0

Redirect headers

Date
Wed, 06 Nov 2019 06:08:21 GMT
Server
nginx
Location
/partner?source=dados&__user_check__=1&sync_id=d5a7ce66-005b-11ea-8984-173c25ca0a06
Access-Control-Allow-Methods
GET, POST, OPTIONS
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0
Access-Control-Allow-Credentials
false
X-fe
124
Connection
keep-alive
Content-Length
0
dt.html
cdn.digitru.st/prod/1.5.37/ Frame 2D84
0
0
Document
General
Full URL
https://cdn.digitru.st/prod/1.5.37/dt.html
Requested by
Host: cdn.digitru.st
URL: https://cdn.digitru.st/prod/1/digitrust.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
159.180.84.2 , United States, ASN33047 (INSTART - Instart Logic, Inc, US),
Reverse DNS
Software
DTOrigin /
Resource Hash

Request headers

:method
GET
:authority
cdn.digitru.st
:scheme
https
:path
/prod/1.5.37/dt.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809

Response headers

status
200
content-type
text/html
content-length
1303
expires
Wed, 06 Nov 2019 20:07:06 GMT
last-modified
Mon, 23 Sep 2019 14:27:17 GMT
cache-control
max-age=86400
content-encoding
gzip
date
Tue, 05 Nov 2019 20:07:06 GMT
accept-ranges
bytes
etag
"f62ec59165fc2a53f53d87b7d3f33f50"
x-instart-cache-id
4:4824233327175395010::1572984425
x-instart-request-id
129454684130405819:SEN01-CPVNPPRY16:1573020501:0
p3p
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
access-control-allow-origin
*
server
DTOrigin
265228
search.spotxchange.com/openrtb/2.3/dados/
0
1 KB
XHR
General
Full URL
https://search.spotxchange.com/openrtb/2.3/dados/265228
Requested by
Host: aka.spotxcdn.com
URL: https://aka.spotxcdn.com/integration/directsdk/v1/directsdk.js
Protocol
HTTP/1.1
Security
TLS 1.2, RSA, AES_256_GCM
Server
185.94.180.123 , Netherlands, ASN35220 (SPOTX-AMS, NL),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
x-openrtb-version
2.3
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
application/json

Response headers

Date
Wed, 06 Nov 2019 06:08:21 GMT
X-SpotX-Timing-Transform
0.000427
X-SpotX-Timing-SpotMarket
0.010109
X-SpotX-Timing-Page-Mux
0.000414
X-SpotX-Timing-Page-Require
0.000298
X-fe
027
Connection
keep-alive
X-SpotX-Timing-Page-Cookie
0.000035
X-SpotX-Timing-Page
0.019036
Pragma
no-cache
X-SpotX-Timing-Page-Context
0.004531
Last-Modified
Wed, 06 Nov 2019 06:08:21 GMT
Server
nginx
Cache-Control
no-cache, must-revalidate, post-check=0, pre-check=0
X-SpotX-Timing-SpotMarket-Primary
0.010109
Access-Control-Allow-Methods
POST, GET, PATCH, DELETE, OPTIONS
Content-Type
application/json
Access-Control-Allow-Origin
https://www.computerworld.com
X-SpotX-Timing-Page-Misc
0.003201
X-SpotX-Timing-Page-Exception
0.000000
X-SpotX-Timing-SpotMarket-Secondary
0.000000
X-SpotX-Timing-Page-URI
0.000021
Access-Control-Allow-Credentials
true
Access-Control-Allow-Headers
Expires
Thu, 01 Jan 1970 00:00:00 GMT
1_360_1.mp4
v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/
64 KB
0
Media
General
Full URL
https://v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/1_360_1.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Description%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106060809
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Range
bytes=589824-

Response headers

x-amz-version-id
1YaqZC7.gjT3DeqS5u_Mw8fNPN8xlWes
via
1.1 varnish, 1.1 varnish
etag
"cc1120ad618b42d4141faea4ef590f1b"
age
80767
x-cache
HIT, HIT
status
206
content-length
11997974
x-served-by
cache-sjc3124-SJC, cache-fra19183-FRA
content-range
bytes 589824-12587797/12587798
last-modified
Tue, 05 Nov 2019 07:34:05 GMT
x-timer
S1573020502.166527,VS0,VE0
date
Wed, 06 Nov 2019 06:08:22 GMT
content-type
video/mp4
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes, bytes
x-cache-hits
0, 0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
api.rlcdn.com
URL
https://api.rlcdn.com/api/identity?pid=2&rt=envelope

Verdicts & Comments Add Verdict or Comment

314 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| getQueryVariable function| addCSS function| $ function| jQuery function| getApolloLocaleSlugMap function| getApolloLocaleIdMap function| getApolloLocaleDescMap function| getApolloLocaleBrandMap function| getCountryCodeLocaleMap function| getCookie function| setCookie function| getFastlyCountryCode function| getLocaleFromCountryCode function| getAutoLocale function| getSelectedLocale function| setSelectedLocale function| browserLocaleError function| setBrowserLocale function| getRedirectLocale function| getBrowserLocale function| getLocale function| __cmp object| consent object| dataLayer object| _sp_ function| getConsentInfo function| idgCMPSourcepointCallback function| runQueue function| watchConsentQueue function| bindReshowCmp object| jQuery110206870528735602166 object| blueConicPreListeners function| BCClass object| blueConicClient string| twitterUrl string| linkedInUrl string| facebookUrl string| youTubeUrl string| twitterHandle string| busUnit string| localeEdition string| busUnitAddress object| IDG object| googletag string| positionDataTag object| adUnitIdsMap function| getSrcCookie function| isElementAboveTheFold function| isElementInViewport function| isVisible function| isTabVisible function| buildPositionData object| adLayer boolean| global_ShowSuper boolean| global_ShowHero string| url object| diagPixSentCodes object| __iasPET object| Logon object| $thm function| loadGPT function| requestAds function| iasDataHandler number| IASPET_TIMEOUT number| __iasPETTimeoutRequestAds object| Select2 string| isProd string| ocEnabledSite string| brandCode string| brandName string| brandId boolean| regDebugLog boolean| brandIdDemandgen boolean| brandIdEvents boolean| brandIdResearch boolean| brandIdThirdparty boolean| isEu string| regApiUrl string| apiKey string| tokenPrefix string| tokenSuffix string| brandDomain string| insiderContentType boolean| notEmptyArticle boolean| notEmptyMediaResource boolean| isInsiderPremium boolean| isResourceInsiderPremium object| ownerIds string| campaignId string| assetId string| placementId string| clientCompany string| businessUnit object| _alcTag object| ALC object| Hashes boolean| canRunAds string| oneRegPlacementID boolean| supMontMods undefined| segs object| ntvConfig string| prodNames string| prodManufacturers string| prodCategories string| prodVendors string| insiderSignedIn string| idg_uuid string| dlJobFunction object| dlJobPosition object| dlIndustry undefined| insiderToken undefined| tokens string| sincePublished string| edition string| adBlockStatus function| AdBlockEnabled function| numberFromDataLayer function| stringFromDataLayer undefined| userData undefined| hermesAttrs undefined| userKeys object| permutive object| $jscomp object| ntv number| ntvLoadStart undefined| nQuery object| prdom object| onFocusEvents function| ntvjQueryInit function| ntvExtends function| ntvAppendStylesheet function| ntvAppendScript function| ntvArticleTracker object| safeTrackingTags function| ntvGetElementViewability function| ntvViewableImpressionTracker object| ntvToutAds object| PostRelease boolean| onFocus function| parcelRequire number| relatedTop string| coreEdition string| coreEditionAbbr string| coreEditionDescription number| ocHeadTop undefined| menuWidth function| animateSlideLeft function| animateSlideRight function| calcAdHeight object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| google_tag_manager function| postscribe function| moment string| firstSessionDate string| lastSessionDate string| currentSessionDate number| sessionNumber undefined| inSession number| daysSinceLastSession object| currentTime number| longExpiry undefined| lastSessionMS function| isValidEmailAddress function| encodeQueryData object| __gcse number| google_srt undefined| google_measure_js_timing string| slot function| parallaxLb function| parallaxLbHandler boolean| supLocaleEd function| exeImuMobile function| exeImuDesktop object| google object| closure_lm_797678 string| contentCopyright string| contentEdition object| headertag function| headertag_render object| pbjs object| rubicontag object| SC boolean| suppressEd string| obEdition string| widgetId function| renderTSO function| selectTSOAds object| AWIN function| DP_jQuery_1573020490621 function| getLoginStatusForOmniture function| getQsVal function| getTrackingToken function| socialTrack function| linkedInTrack function| initZooms function| readCookie function| readRawCookie function| getUrlParams function| initAccordion undefined| ss_android undefined| ss_set undefined| ss_icons undefined| ss_keywords undefined| ss_legacy undefined| ss_getElementsByClassName undefined| ss_liga object| g_brandAnalyticsInfoMap string| slugCode undefined| newsletterFormAction function| addSlugCode object| LazyLoader object| xrayAd number| ocHead number| relatedContentHeight number| localeId boolean| g_bRequireHttps object| _comscore object| OBR string| OB_releaseVer function| OBR$ object| outbrain object| outbrain_rater object| acceptedDomains string| cleanedHost object| a object| f function| _googCsa number| nextSearchboxId function| generateSubtag string| GoogleAnalyticsObject function| ga object| _auto function| ael object| httpRequest function| onYouTubeIframeAPIReady function| udm_ object| ns_p object| COMSCORE number| googleNDT_ number| _googCsaAlwaysHttps number| googleAltLoader object| google_tag_data object| gaplugins object| twttr function| fbq function| _fbq object| Mustache function| BlueConicMetaDataService function| RuleService function| ouibounce function| FormRuleService function| BlockAdBlock object| blockAdBlock object| bcConnectionUtil function| BlueConicDataLayerUtil object| jsonpath function| md5 object| jQuery111208137652426811994 object| __SKIM_JS_GLOBAL__ object| skimlinksAPI string| _linkedin_partner_id object| _linkedin_data_partner_ids function| twq string| _linkedin_data_partner_id object| gaGlobal object| gaData function| lintrk boolean| _already_called_lintrk object| bc_json716 object| OB_PROXY object| NVPInjector string| VIDGET_VERSION function| OB_VidgetServiceCallBack number| vidgetServiceInstance function| OB_VidgetServiceCallBack0 object| OB_VIDGET function| _extends function| _typeof function| _createClass function| _classCallCheck function| OB_VidgetAuditCallback object| vdz object| cnxUmm object| cnxEnfStorage function| cnxsetTimeout function| cnxsetInterval string| cnxPageGuid number| spp object| cnxJSONP_2b29e9026ddbd4ef10d01573020491967 number| extraDataInstance function| obpExtraDataCallback0 function| OB_CtwClientCalls number| google_global_correlator object| closure_lm_78406 function| webpackJsonpbzkf2i4hd6s undefined| _ object| platform function| setImmediate function| clearImmediate object| vidazoo object| Vidiazoo object| MoatSuperV26 object| cnxJSONP_1bd718bb94cf9631b9eb1573020493530 boolean| CLOSURE_NO_DEPS object| SpotX object| DigiTrust function| cnxAddEventListener

21 Cookies

Domain/Path Name / Value
.outbrain.com/ Name: recs_e05a921dcf412ea4536b468a15c12d30
Value: 0B2395937617A1925901673A2229989104A2355440387A2212391210A2417301361AC2B2361454795A2435535374ACD1
widgets.outbrain.com/ Name: akacd_widgets_routing
Value: 3750473289~rv=20~id=f5e0a614db8e3a129cfa35cd30bbbf5a
.outbrain.com/ Name: obuid
Value: 8ae25202-b8d1-4e5c-8661-8de7cb68ea53
.computerworld.com/ Name: _gid
Value: GA1.2.1277038511.1573020491
.computerworld.com/ Name: _ga
Value: GA1.2.1128562751.1573020491
.computerworld.com/ Name: AMP_TOKEN
Value: %24NOT_FOUND
.computerworld.com/ Name: OB-USER-TOKEN
Value: 8ae25202-b8d1-4e5c-8661-8de7cb68ea53
www.computerworld.com/article/3451956 Name: fastlyCountryCode
Value: DE
.computerworld.com/ Name: aiia
Value: true
www.computerworld.com/ Name: lastSessionDate
Value: Wed, 06 Nov 2019 06:08:10 GMT
.computerworld.com/ Name: _fbp
Value: fb.1.1573020490931.1880677225
www.computerworld.com/ Name: currentSessionDate
Value: Wed, 06 Nov 2019 06:08:10 GMT
.computerworld.com/ Name: _sp_enable_dfp_personalized_ads
Value: false
www.computerworld.com/ Name: inSession
Value: true
www.computerworld.com/ Name: BCSessionID
Value: No%20profile%20present%20and%20will%20not%20be%20created.
www.computerworld.com/article/3451956 Name: ntvSession
Value: {}
www.computerworld.com/ Name: firstSessionDate
Value: Wed, 06 Nov 2019 06:08:10 GMT
.computerworld.com/ Name: _gat_UA-300704-1
Value: 1
.computerworld.com/ Name: consentUUID
Value: 1617e8ac-263a-4230-9eab-66e4a0b55e32
www.computerworld.com/ Name: last_visit_bc
Value: 1573020489892
www.computerworld.com/ Name: sessionNumber
Value: 1

11 Console Messages

Source Level URL
Text
console-api error URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019103101.js(Line 1)
Message:
Exception in queued GPT command TypeError: Cannot read property 'getItem' of null
console-api warning URL: https://www.google.com/cse/static/element/b5752d27691147d6/cse_element__en.js?usqp=CAI%3D(Line 134)
Message:
Component of type results is missing for Element named two-column.
console-api error URL: https://idg.blueconic.net/plugin/library/9694aa882dd83090c8baff998ebb5b60(Line 13)
Message:
Error in getFieldValue: Error: Syntax error, unrecognized expression: 'primaryCategory'
console-api log URL: https://cdn.blueconic.net/idg.js(Line 129)
Message:
[BC]Item will not be scraped due to missing value for required field: insidericon
console-api log (Line 1)
Message:
Local storage not available.
console-api log (Line 1)
Message:
Automate is initialized.
console-api warning URL: https://static.vidazoo.com/basev/prebid/prebid.js(Line 3)
Message:
fun-hooks: referenced 'registerAdserver' but it was never created
console-api warning URL: https://static.vidazoo.com/basev/prebid/prebid.js(Line 3)
Message:
fun-hooks: referenced 'registerAdserver' but it was never created
console-api warning URL: https://static.vidazoo.com/basev/prebid/prebid.js(Line 3)
Message:
fun-hooks: referenced 'registerAdserver' but it was never created
console-api warning URL: https://static.vidazoo.com/basev/prebid/prebid.js(Line 3)
Message:
fun-hooks: referenced 'registerAdserver' but it was never created
console-api warning URL: https://static.vidazoo.com/basev/prebid/prebid.js(Line 3)
Message:
fun-hooks: referenced 'registerAdserver' but it was never created

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

adservice.google.com
adservice.google.de
aka.spotxcdn.com
alt.idgesg.net
ampcid.google.com
ampcid.google.de
analytics.twitter.com
api.rlcdn.com
api.skimlinks.mgr.consensu.org
automate-prod.s3.amazonaws.com
automate.linksynergy.com
bis.vidazoo.com
cdn.adsafeprotected.com
cdn.blueconic.net
cdn.connatix.com
cdn.digitru.st
cdn.permutive.com
cdns.connatix.com
ck.connatix.com
clients1.google.com
cmp.computerworld.com
connect.facebook.net
core.connatix.com
cse.google.com
csi.gstatic.com
d2zv5rkii46miq.cloudfront.net
edt.cio.com
eus.rubiconproject.com
i.connatix.com
idg.blueconic.net
idge.staticworld.net
images.idgesg.net
images.outbrainimg.com
imasdk.googleapis.com
inventory.vidazoo.com
jadserve.postrelease.com
js-sec.indexww.com
js.spotx.tv
libs.outbrain.com
libs.sphere.com
log.outbrainimg.com
match.adsrvr.org
mcdp-nydc1.outbrain.com
mv.outbrain.com
ntvcld-a.akamaihd.net
odb.outbrain.com
p.skimresources.com
p.typekit.net
pixel.adsafeprotected.com
platform.twitter.com
prebid-server.rubiconproject.com
px.ads.linkedin.com
r.skimresources.com
r3---sn-4g5e6nlk.googlevideo.com
r3---sn-4g5ednsl.googlevideo.com
s.ntv.io
s.skimresources.com
s0.2mdn.net
sb.scorecardresearch.com
search.spotxchange.com
securepubads.g.doubleclick.net
server.vidazoo.com
snap.licdn.com
sourcepoint.mgr.consensu.org
static.ads-twitter.com
static.vidazoo.com
sync.search.spotxchange.com
t.co
t.skimresources.com
tcheck.outbrainimg.com
trk.connatix.com
uploads-ssl.webflow.com
use.fontawesome.com
use.typekit.net
v.connatix.com
vastcdn.outbrain.com
videoadextradata.outbrain.com
videoclientsservicescalls.outbrain.com
w.soundcloud.com
widgets.outbrain.com
www.computerworld.com
www.dwin2.com
www.facebook.com
www.google-analytics.com
www.google.com
www.googletagmanager.com
www.linkedin.com
api.rlcdn.com
104.109.64.186
104.109.78.125
104.19.149.54
104.244.42.131
104.244.42.5
13.224.196.15
13.224.196.60
13.225.78.11
143.204.101.22
151.101.112.157
151.101.114.165
151.101.114.2
151.101.114.217
151.101.14.110
151.101.14.165
151.101.14.217
151.101.194.49
151.139.128.10
159.180.84.2
172.217.23.162
18.194.227.247
184.31.90.250
185.94.180.123
185.94.180.126
185.94.180.127
199.166.0.26
2.16.186.51
2.18.232.234
2.18.234.163
2.18.234.190
2.18.234.21
2.18.70.82
2.19.43.224
23.111.9.35
23.20.228.30
2404:6800:4001:807::2003
2600:9000:20eb:7600:17:5578:e080:21
2606:2800:234:46c:e8b:1e2f:2bd:694
2a00:1450:4001:59::9
2a00:1450:4001:6a::8
2a00:1450:4001:800::2002
2a00:1450:4001:800::2004
2a00:1450:4001:800::200e
2a00:1450:4001:806::2008
2a00:1450:4001:809::200e
2a00:1450:4001:818::2002
2a00:1450:4001:81a::2006
2a00:1450:4001:81b::200e
2a00:1450:4001:81d::200a
2a00:1450:4001:820::200e
2a02:26f0:10c:396::2a83
2a02:26f0:6c00:296::25ea
2a03:2880:f01c:8012:face:b00c:0:3
2a03:2880:f11c:8183:face:b00c:0:25de
2a05:f500:10:101::b93f:9101
2a05:f500:10:101::b93f:9105
34.195.95.173
34.231.100.212
35.190.40.172
35.190.59.101
35.201.67.47
52.202.4.121
52.203.65.11
52.203.78.22
52.28.80.136
52.59.120.88
52.72.8.4
54.154.79.134
54.231.176.198
64.202.112.31
69.16.175.10
69.16.175.42
70.42.32.31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