Submitted URL: http://edt.cio.com/c/17SnD46y7dFmQBZvUeVsNeMhSDeu
Effective URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_s...
Submission: On November 06 via api from US

Summary

This website contacted 69 IPs in 5 countries across 50 domains to perform 270 HTTP transactions. The main IP is 151.101.114.165, located in Frankfurt am Main, Germany and belongs to FASTLY - Fastly, US. The main domain is www.computerworld.com.
TLS certificate: Issued by GlobalSign CloudSSL CA - SHA256 - G3 on September 13th 2019. Valid for: 9 months.
This is the only time www.computerworld.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 151.101.194.49 54113 (FASTLY)
1 74 151.101.114.165 54113 (FASTLY)
1 2600:9000:21f... 16509 (AMAZON-02)
1 143.204.101.120 16509 (AMAZON-02)
1 13.224.196.57 16509 (AMAZON-02)
1 2.18.69.96 16625 (AKAMAI-AS)
3 23.111.9.35 33438 (HIGHWINDS2)
12 104.109.64.186 20940 (AKAMAI-ASN1)
1 2.18.69.197 16625 (AKAMAI-AS)
10 151.101.14.165 54113 (FASTLY)
3 18.194.227.247 16509 (AMAZON-02)
10 54.81.224.214 14618 (AMAZON-AES)
1 54.154.201.99 16509 (AMAZON-02)
2 172.217.16.130 15169 (GOOGLE)
2 3.123.110.218 16509 (AMAZON-02)
2 2a00:1450:400... 15169 (GOOGLE)
1 104.19.149.54 13335 (CLOUDFLAR...)
2 2a00:1450:400... 15169 (GOOGLE)
4 35.153.215.15 14618 (AMAZON-AES)
3 2a00:1450:400... 15169 (GOOGLE)
4 2a00:1450:400... 15169 (GOOGLE)
1 52.85.183.120 16509 (AMAZON-02)
1 13.225.78.11 16509 (AMAZON-02)
1 199.166.0.26 7415 (ADSAFE-1)
13 2.18.69.225 16625 (AKAMAI-AS)
2 151.101.114.110 54113 (FASTLY)
5 14 23.45.99.242 20940 (AKAMAI-ASN1)
1 2a00:1450:400... 15169 (GOOGLE)
5 2a00:1450:400... 15169 (GOOGLE)
2 52.218.212.138 16509 (AMAZON-02)
1 1 2606:2800:234... 15133 (EDGECAST)
2 151.101.112.157 54113 (FASTLY)
2 2.16.186.99 20940 (AKAMAI-ASN1)
1 2a00:1450:400... 15169 (GOOGLE)
2 2a03:2880:f01... 32934 (FACEBOOK)
3 151.139.128.10 20446 (HIGHWINDS3)
3 35.201.67.47 15169 (GOOGLE)
1 2a02:26f0:6c0... 20940 (AKAMAI-ASN1)
1 2 35.190.59.101 15169 (GOOGLE)
3 2a03:2880:f11... 32934 (FACEBOOK)
1 2 2a05:f500:10:... 14413 (LINKEDIN)
1 1 2a05:f500:10:... 14413 (LINKEDIN)
1 104.244.42.5 13414 (TWITTER)
1 35.190.40.172 15169 (GOOGLE)
7 2.18.70.82 16625 (AKAMAI-AS)
1 64.202.112.63 22075 (AS-OUTBRAIN)
1 34.224.34.200 14618 (AMAZON-AES)
1 104.244.42.131 13414 (TWITTER)
9 151.101.114.217 54113 (FASTLY)
1 54.236.131.34 14618 (AMAZON-AES)
1 151.101.14.2 54113 (FASTLY)
3 70.42.32.31 22075 (AS-OUTBRAIN)
4 184.31.90.250 20940 (AKAMAI-ASN1)
1 151.101.14.217 54113 (FASTLY)
3 2a00:1450:400... 15169 (GOOGLE)
1 151.101.114.2 54113 (FASTLY)
2 64.202.112.127 22075 (AS-OUTBRAIN)
14 52.54.204.2 14618 (AMAZON-AES)
1 2a00:1450:400... 15169 (GOOGLE)
1 70.42.32.95 22075 (AS-OUTBRAIN)
10 69.16.175.10 20446 (HIGHWINDS3)
1 3.225.101.71 14618 (AMAZON-AES)
1 52.203.78.22 14618 (AMAZON-AES)
1 2607:f8b0:400... 15169 (GOOGLE)
1 1 2a00:1450:400... 15169 (GOOGLE)
1 2a00:1450:400... 15169 (GOOGLE)
1 2a02:26f0:10c... 20940 (AKAMAI-ASN1)
1 52.58.133.90 16509 (AMAZON-02)
1 1 185.94.180.127 35220 (SPOTX-AMS)
1 2.18.68.138 16625 (AKAMAI-AS)
1 104.109.78.125 20940 (AKAMAI-ASN1)
2 159.180.84.2 33047 (INSTART)
1 2 185.94.180.126 35220 (SPOTX-AMS)
270 69
Apex Domain
Subdomains
Transfer
65 computerworld.com
www.computerworld.com
cmp.computerworld.com
537 KB
25 connatix.com
cdn.connatix.com
cdns.connatix.com
ck.connatix.com
core.connatix.com
i.connatix.com
trk.connatix.com
v.connatix.com
209 KB
22 outbrain.com
widgets.outbrain.com
odb.outbrain.com
mcdp-nydc1.outbrain.com
libs.outbrain.com
mv.outbrain.com
videoclientsservicescalls.outbrain.com
videoadextradata.outbrain.com
vastcdn.outbrain.com
153 KB
14 scorecardresearch.com
sb.scorecardresearch.com
13 KB
12 vidazoo.com
static.vidazoo.com
bis.vidazoo.com
server.vidazoo.com
inventory.vidazoo.com
655 KB
12 idgesg.net
alt.idgesg.net
images.idgesg.net
744 KB
12 typekit.net
use.typekit.net
p.typekit.net
244 KB
11 blueconic.net
cdn.blueconic.net
idg.blueconic.net
173 KB
10 google.com
cse.google.com
adservice.google.com
www.google.com
clients1.google.com
ampcid.google.com
160 KB
10 staticworld.net
idge.staticworld.net
19 KB
8 outbrainimg.com
tcheck.outbrainimg.com
log.outbrainimg.com
images.outbrainimg.com
278 KB
8 skimresources.com
s.skimresources.com
p.skimresources.com
t.skimresources.com
r.skimresources.com
17 KB
4 sphere.com
libs.sphere.com
74 KB
4 google-analytics.com
www.google-analytics.com
19 KB
4 postrelease.com
jadserve.postrelease.com
5 KB
3 googleapis.com
imasdk.googleapis.com
93 KB
3 linkedin.com
px.ads.linkedin.com
www.linkedin.com
3 KB
3 facebook.com
www.facebook.com
682 B
3 consensu.org
sourcepoint.mgr.consensu.org
api.skimlinks.mgr.consensu.org
3 KB
3 fontawesome.com
use.fontawesome.com
106 KB
2 spotxchange.com
sync.search.spotxchange.com
search.spotxchange.com Failed
1 KB
2 digitru.st
cdn.digitru.st
11 KB
2 rubiconproject.com
prebid-server.rubiconproject.com
eus.rubiconproject.com
367 B
2 googlevideo.com
r5---sn-4g5ednsl.googlevideo.com
r12---sn-4g5ednzz.googlevideo.com
725 KB
2 facebook.net
connect.facebook.net
96 KB
2 akamaihd.net
ntvcld-a.akamaihd.net
52 KB
2 ads-twitter.com
static.ads-twitter.com
4 KB
2 twitter.com
platform.twitter.com
analytics.twitter.com
955 B
2 amazonaws.com
automate-prod.s3.amazonaws.com
178 KB
2 dwin2.com
www.dwin2.com
81 KB
2 google.de
adservice.google.de
ampcid.google.de
1 KB
2 googletagmanager.com
www.googletagmanager.com
73 KB
2 doubleclick.net
securepubads.g.doubleclick.net
74 KB
2 adsafeprotected.com
cdn.adsafeprotected.com
pixel.adsafeprotected.com
7 KB
1 spotxcdn.com
aka.spotxcdn.com
145 KB
1 spotx.tv
js.spotx.tv
589 B
1 gstatic.com
csi.gstatic.com
57 B
1 2mdn.net
s0.2mdn.net
11 KB
1 linksynergy.com
automate.linksynergy.com
592 B
1 t.co
t.co
448 B
1 licdn.com
snap.licdn.com
2 KB
1 webflow.com
uploads-ssl.webflow.com
1 KB
1 soundcloud.com
w.soundcloud.com
3 KB
1 permutive.com
cdn.permutive.com
104 KB
1 adsrvr.org
match.adsrvr.org
542 B
1 ntv.io
s.ntv.io
90 KB
1 indexww.com
js-sec.indexww.com
33 KB
1 cloudfront.net
d2zv5rkii46miq.cloudfront.net
2 KB
1 cio.com
edt.cio.com
627 B
0 rlcdn.com Failed
api.rlcdn.com Failed
270 50
Domain Requested by
62 www.computerworld.com 1 redirects www.computerworld.com
14 trk.connatix.com cdns.connatix.com
14 sb.scorecardresearch.com 5 redirects www.computerworld.com
12 widgets.outbrain.com www.computerworld.com
widgets.outbrain.com
libs.outbrain.com
11 use.typekit.net www.computerworld.com
s.ntv.io
10 idg.blueconic.net cdn.blueconic.net
10 idge.staticworld.net www.computerworld.com
www.google.com
10 alt.idgesg.net www.computerworld.com
9 static.vidazoo.com libs.outbrain.com
static.vidazoo.com
6 images.outbrainimg.com
6 v.connatix.com
4 libs.sphere.com widgets.outbrain.com
libs.sphere.com
4 www.google-analytics.com www.googletagmanager.com
www.google-analytics.com
www.computerworld.com
4 www.google.com cse.google.com
www.computerworld.com
4 jadserve.postrelease.com s.ntv.io
www.computerworld.com
3 imasdk.googleapis.com cdns.connatix.com
imasdk.googleapis.com
3 mcdp-nydc1.outbrain.com widgets.outbrain.com
3 www.facebook.com www.computerworld.com
connect.facebook.net
3 t.skimresources.com www.computerworld.com
s.skimresources.com
3 cmp.computerworld.com www.computerworld.com
3 use.fontawesome.com www.computerworld.com
2 sync.search.spotxchange.com 1 redirects
2 cdn.digitru.st aka.spotxcdn.com
cdn.digitru.st
2 videoclientsservicescalls.outbrain.com libs.outbrain.com
libs.sphere.com
2 px.ads.linkedin.com 1 redirects www.computerworld.com
2 r.skimresources.com 1 redirects www.computerworld.com
2 p.skimresources.com www.computerworld.com
2 connect.facebook.net www.computerworld.com
connect.facebook.net
2 ntvcld-a.akamaihd.net www.computerworld.com
2 static.ads-twitter.com www.computerworld.com
2 automate-prod.s3.amazonaws.com www.computerworld.com
2 www.dwin2.com www.googletagmanager.com
www.dwin2.com
2 images.idgesg.net www.computerworld.com
2 adservice.google.com securepubads.g.doubleclick.net
imasdk.googleapis.com
2 cse.google.com www.computerworld.com
www.google.com
2 www.googletagmanager.com www.computerworld.com
www.googletagmanager.com
2 sourcepoint.mgr.consensu.org www.computerworld.com
2 securepubads.g.doubleclick.net www.computerworld.com
securepubads.g.doubleclick.net
1 eus.rubiconproject.com static.vidazoo.com
1 aka.spotxcdn.com
1 js.spotx.tv 1 redirects
1 prebid-server.rubiconproject.com static.vidazoo.com
1 inventory.vidazoo.com
1 vastcdn.outbrain.com libs.sphere.com
1 r12---sn-4g5ednzz.googlevideo.com
1 r5---sn-4g5ednsl.googlevideo.com 1 redirects
1 csi.gstatic.com imasdk.googleapis.com
1 server.vidazoo.com static.vidazoo.com
1 bis.vidazoo.com static.vidazoo.com
1 videoadextradata.outbrain.com libs.sphere.com
1 s0.2mdn.net imasdk.googleapis.com
1 mv.outbrain.com widgets.outbrain.com
1 i.connatix.com
1 libs.outbrain.com widgets.outbrain.com
1 odb.outbrain.com widgets.outbrain.com
1 core.connatix.com cdns.connatix.com
1 ck.connatix.com cdns.connatix.com
1 cdns.connatix.com cdn.connatix.com
1 cdn.connatix.com www.computerworld.com
1 analytics.twitter.com static.ads-twitter.com
1 automate.linksynergy.com www.computerworld.com
1 log.outbrainimg.com widgets.outbrain.com
1 tcheck.outbrainimg.com widgets.outbrain.com
1 api.skimlinks.mgr.consensu.org s.skimresources.com
1 t.co www.computerworld.com
1 www.linkedin.com 1 redirects
1 snap.licdn.com www.computerworld.com
1 s.skimresources.com www.googletagmanager.com
1 ampcid.google.de www.google-analytics.com
1 ampcid.google.com www.google-analytics.com
1 platform.twitter.com 1 redirects
1 clients1.google.com www.computerworld.com
1 pixel.adsafeprotected.com cdn.adsafeprotected.com
1 uploads-ssl.webflow.com www.computerworld.com
1 w.soundcloud.com www.googletagmanager.com
1 adservice.google.de securepubads.g.doubleclick.net
1 cdn.permutive.com www.computerworld.com
1 p.typekit.net www.computerworld.com
1 match.adsrvr.org js-sec.indexww.com
1 s.ntv.io www.computerworld.com
1 js-sec.indexww.com www.computerworld.com
1 cdn.adsafeprotected.com www.computerworld.com
1 cdn.blueconic.net www.computerworld.com
1 d2zv5rkii46miq.cloudfront.net www.computerworld.com
1 edt.cio.com 1 redirects
0 search.spotxchange.com Failed aka.spotxcdn.com
0 api.rlcdn.com Failed js-sec.indexww.com
270 87
Subject Issuer Validity Valid
idg.map.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-09-13 -
2020-06-13
9 months crt.sh
*.cloudfront.net
DigiCert Global CA G2
2019-07-17 -
2020-07-05
a year crt.sh
*.blueconic.net
Thawte RSA CA 2018
2017-12-13 -
2019-12-13
2 years crt.sh
*.adsafeprotected.com
COMODO RSA Domain Validation Secure Server CA
2018-08-20 -
2020-09-17
2 years crt.sh
san.casalemedia.com
GeoTrust RSA CA 2018
2019-07-17 -
2020-03-09
8 months crt.sh
*.fontawesome.com
DigiCert SHA2 Secure Server CA
2019-10-28 -
2020-12-23
a year crt.sh
*.typekit.net
DigiCert SHA2 Secure Server CA
2018-07-20 -
2020-01-03
a year crt.sh
*.ntv.io
DigiCert SHA2 Secure Server CA
2018-06-12 -
2019-12-11
a year crt.sh
cmp.idg.de
Let's Encrypt Authority X3
2019-10-16 -
2020-01-14
3 months crt.sh
*.adsrvr.org
Trustwave Organization Validation SHA256 CA, Level 1
2019-03-07 -
2021-04-19
2 years crt.sh
*.g.doubleclick.net
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
sourcepoint.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2019-04-22 -
2020-04-29
a year crt.sh
*.google-analytics.com
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
ssl974613.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2019-08-21 -
2020-02-27
6 months crt.sh
*.google.com
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
*.postrelease.com
Amazon
2019-03-27 -
2020-04-27
a year crt.sh
www.google.com
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
*.soundcloud.com
GlobalSign Domain Validation CA - SHA256 - G2
2018-04-12 -
2020-06-08
2 years crt.sh
uploads-ssl.webflow.com
Amazon
2018-12-22 -
2020-01-22
a year crt.sh
*.outbrain.com
DigiCert SHA2 Secure Server CA
2018-12-14 -
2020-03-14
a year crt.sh
f4.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-04-10 -
2020-03-21
a year crt.sh
*.scorecardresearch.com
COMODO RSA Organization Validation Secure Server CA
2018-11-28 -
2019-12-26
a year crt.sh
*.s3.amazonaws.com
DigiCert Baltimore CA-2 G2
2018-11-07 -
2020-02-07
a year crt.sh
ads-twitter.com
DigiCert SHA2 High Assurance Server CA
2019-08-14 -
2020-08-18
a year crt.sh
a248.e.akamai.net
DigiCert Secure Site ECC CA-1
2019-08-13 -
2020-08-12
a year crt.sh
*.facebook.com
DigiCert SHA2 High Assurance Server CA
2019-09-22 -
2019-12-20
3 months crt.sh
*.skimresources.com
DigiCert SHA2 Secure Server CA
2018-09-13 -
2020-10-07
2 years crt.sh
*.licdn.com
DigiCert SHA2 Secure Server CA
2019-04-01 -
2021-05-07
2 years crt.sh
px.ads.linkedin.com
DigiCert SHA2 Secure Server CA
2019-05-29 -
2021-06-29
2 years crt.sh
t.co
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
api.skimlinks.mgr.consensu.org
DigiCert SHA2 Secure Server CA
2019-10-04 -
2021-10-07
2 years crt.sh
*.outbrainimg.com
DigiCert SHA2 Secure Server CA
2019-02-24 -
2020-05-25
a year crt.sh
*.linksynergy.com
Thawte RSA CA 2018
2019-06-11 -
2021-07-18
2 years crt.sh
*.twitter.com
DigiCert SHA2 High Assurance Server CA
2019-04-09 -
2020-04-01
a year crt.sh
j3.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-11-06 -
2020-09-16
10 months crt.sh
*.connatix.com
Amazon
2019-10-19 -
2020-11-19
a year crt.sh
f2.shared.global.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2019-07-30 -
2020-07-25
a year crt.sh
*.sphere.com
DigiCert SHA2 Secure Server CA
2019-03-15 -
2020-06-13
a year crt.sh
*.googleapis.com
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
*.doubleclick.net
GTS CA 1O1
2019-10-10 -
2020-01-02
3 months crt.sh
*.vidazoo.com
Sectigo RSA Domain Validation Secure Server CA
2019-03-20 -
2021-04-03
2 years crt.sh
bi-test.vidazoo.com
Let's Encrypt Authority X3
2019-09-19 -
2019-12-18
3 months crt.sh
adserver.vidazoo.com
Let's Encrypt Authority X3
2019-10-29 -
2020-01-27
3 months crt.sh
*.c.docs.google.com
GTS CA 1O1
2019-10-22 -
2019-12-31
2 months crt.sh
*.rubiconproject.com
DigiCert SHA2 Secure Server CA
2019-01-10 -
2021-01-14
2 years crt.sh
cdn.spotxcdn.com
GeoTrust RSA CA 2018
2019-04-24 -
2020-05-23
a year crt.sh
cdn.digitru.st
Sectigo RSA Organization Validation Secure Server CA
2019-05-09 -
2021-05-08
2 years crt.sh
*.search.spotxchange.com
GeoTrust RSA CA 2018
2019-03-20 -
2021-04-21
2 years crt.sh

This page contains 15 frames:

Primary Page: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Frame ID: 6F1E217C400448E793E17474858F8993
Requests: 235 HTTP requests in this frame

Frame: https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.8825856633570228
Frame ID: 4DB9009C6D07BD49DBD4C1E0E15E3415
Requests: 1 HTTP requests in this frame

Frame: https://cdns.connatix.com/p/1784/min/connatix.renderer.infeed.min_dc.js
Frame ID: 64AB07E9CBD62919E5BA07D744B406C6
Requests: 26 HTTP requests in this frame

Frame: https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Frame ID: BAD0CA80996E833DB8A796CAEFDAB8F6
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.348.2_en.html
Frame ID: 56FD3D36F0656AC7D897C305F6ED6B58
Requests: 1 HTTP requests in this frame

Frame: https://imasdk.googleapis.com/js/core/bridge3.348.2_en.html
Frame ID: B29CF382AA8FB25130F9811F156AAF0F
Requests: 1 HTTP requests in this frame

Frame: https://vastcdn.outbrain.com/frame?h=https%3A%2F%2Fwww.computerworld.com&id=ob3abf80-9162-d936-20c2-7f32158416c2&url=https%3A%2F%2Frtr.innovid.com%2Fr1.5d259b75d6a577.80095753%3FobOrigUrl%3Dtrue
Frame ID: F8DD2C206D42E1B55C7623712E02C7C6
Requests: 1 HTTP requests in this frame

Frame: https://static.vidazoo.com/basev/prebid/prebid.js
Frame ID: 63BB3B2597ABBD5A0EC18725F613CB88
Requests: 2 HTTP requests in this frame

Frame: https://static.vidazoo.com/basev/prebid/prebid.js
Frame ID: 22F28A160830BAB7EBED2C7F592C9156
Requests: 1 HTTP requests in this frame

Frame: https://static.vidazoo.com/basev/prebid/prebid.js
Frame ID: 83286949851A0F04EA2E71C76312CE38
Requests: 1 HTTP requests in this frame

Frame: https://static.vidazoo.com/basev/prebid/prebid.js
Frame ID: 2DB61D4855E07AFC1832229FA8D8178D
Requests: 1 HTTP requests in this frame

Frame: https://static.vidazoo.com/basev/prebid/prebid.js
Frame ID: 92FA3E7C07DE09F05EB40550EAD88CEE
Requests: 1 HTTP requests in this frame

Frame: https://static.vidazoo.com/basev/prebid/prebid.js
Frame ID: 09A5AF528ABA755DCBEEFAC27684A1CE
Requests: 1 HTTP requests in this frame

Frame: https://eus.rubiconproject.com/usync.html
Frame ID: 926CC61CF32207C6799637554889FA3A
Requests: 1 HTTP requests in this frame

Frame: https://cdn.digitru.st/prod/1.5.37/dt.html
Frame ID: B9AC528641E18D5AC509994C0B316BA2
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://edt.cio.com/c/17SnD46y7dFmQBZvUeVsNeMhSDeu HTTP 302
    https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^Apache-Coyote(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers via /varnish(?: \(Varnish\/([\d.]+)\))?/i

Overall confidence: 100%
Detected patterns
  • headers server /^Apache-Coyote(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /\/\/connect\.facebook\.net\/[^\/]*\/[a-z]*\.js/i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<iframe[^>]* (?:id="comscore"|scr=[^>]+comscore)|\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i
  • script /\.scorecardresearch\.com\/beacon\.js|COMSCORE\.beacon/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

270
Requests

98 %
HTTPS

27 %
IPv6

50
Domains

87
Subdomains

69
IPs

5
Countries

5187 kB
Transfer

12376 kB
Size

17
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://edt.cio.com/c/17SnD46y7dFmQBZvUeVsNeMhSDeu HTTP 302
    https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 98
  • https://www.computerworld.com/article/3451956/ HTTP 301
  • https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html
Request Chain 136
  • https://platform.twitter.com/oct.js HTTP 301
  • https://static.ads-twitter.com/oct.js
Request Chain 139
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035308&c3=&c5=Security&c6=Article%3A%20News%20Analysis&c15=3451956&ns__t=1573026221195&ns_c=UTF-8&cv=3.1e&c8=Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole%20%7C%20Computerworld&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c9= HTTP 302
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035308&c3=&c5=Security&c6=Article%3A%20News%20Analysis&c15=3451956&ns__t=1573026221195&ns_c=UTF-8&cv=3.1e&c8=Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole%20%7C%20Computerworld&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c9=
Request Chain 158
  • https://r.skimresources.com/api/ HTTP 307
  • https://r.skimresources.com/api/?xguid=01DRZTPKEQWZARBKRXXJ4H7DM3&persistence=1&checksum=41eed60473e28c1a530a7a9f7b74c8383d21d577b2b5cf08a3bab4747613f40d
Request Chain 161
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=45909%2C1156330%2C116509&url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&time=1573026221526 HTTP 302
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D45909%252C1156330%252C116509%26url%3Dhttps%253A%252F%252Fwww.computerworld.com%252Farticle%252F3451956%252Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%253Futm_source%253DAdestra%2526utm_medium%253Demail%2526utm_content%253DImage%25253A%252520Why%252520India%2525E2%252580%252599s%252520data%252520protection%252520law%252520needs%252520to%252520avoid%252520the%252520perfection%252520loophole%2526utm_campaign%253DThe%252520Daily%252520Byte%2526utm_term%253DThe%252520Daily%252520Byte%2526utm_date%253D20191106065622%26time%3D1573026221526%26liSync%3Dtrue HTTP 302
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=45909%2C1156330%2C116509&url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&time=1573026221526&liSync=true
Request Chain 219
  • https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=1&ns_st_sp=1&ns_st_sc=1&ns_st_psq=1&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=play&ns_st_po=0&ns_st_cl=189000&ns_st_pb=1&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=0&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=0&ns_st_det=0&ns_st_upc=0&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=0&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=0&ns_st_dlpc=0&ns_st_lpa=0&ns_st_dlpa=0&ns_st_pa=0&ns_ts=1573026223244&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_lt=1&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=0&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0 HTTP 302
  • https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=1&ns_st_sp=1&ns_st_sc=1&ns_st_psq=1&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=play&ns_st_po=0&ns_st_cl=189000&ns_st_pb=1&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=0&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=0&ns_st_det=0&ns_st_upc=0&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=0&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=0&ns_st_dlpc=0&ns_st_lpa=0&ns_st_dlpa=0&ns_st_pa=0&ns_ts=1573026223244&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_lt=1&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=0&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0
Request Chain 227
  • https://r5---sn-4g5ednsl.googlevideo.com/videoplayback?id=66be5dfe4c3b00c5&itag=22&source=youtube&requiressl=yes&mm=31&mn=sn-4g5ednsl&ms=au&mv=m&mvi=4&pl=22&ei=r3nCXZDHDI_C-gbFnIDgCw&susc=gvp&acao=yes&mime=video%2Fmp4&dur=6.060&lmt=1570783928593160&mt=1573026084&txp=2216222&ip=144.76.109.30&ipbits=0&expire=1573055023&sparams=ip%2Cipbits%2Cexpire%2Cid%2Citag%2Csource%2Crequiressl%2Cmm%2Cmn%2Cms%2Cmv%2Cmvi%2Cpl%2Cei%2Csusc%2Cacao%2Cmime%2Cdur%2Clmt&signature=89973EBE846DA1D0326DF51D0C563D299C93CEC39E7D85F3D2268EC9755431B8.683BA9FF23419F1D485FD6DFB451F43F667B72023240D2BFC918E2E51C699ADE&key=us0&cpn=_O5QpwjS3gVlVVNu HTTP 302
  • https://r12---sn-4g5ednzz.googlevideo.com/videoplayback?id=66be5dfe4c3b00c5&itag=22&source=youtube&requiressl=yes&mvi=11&pl=41&ei=r3nCXZDHDI_C-gbFnIDgCw&susc=gvp&acao=yes&mime=video%2Fmp4&dur=6.060&lmt=1570783928593160&txp=2216222&ip=144.76.109.30&ipbits=0&expire=1573055023&sparams=acao,dur,ei,expire,id,ip,ipbits,itag,lmt,mime,mip,mm,mn,ms,mv,mvi,pl,requiressl,source,susc&signature=386B4170A10B562B26289B32721FF16C6FC5827F.0FCDCCC546470FFC43AC0795F6C7FAC4806B10B4&key=cms1&cpn=_O5QpwjS3gVlVVNu&redirect_counter=1&he=yes&rm=sn-4g5e6z76&fexp=23812955&req_id=619e512e257e36e2&cms_redirect=yes&mip=2a01:4f8:192:5414::2&mm=43&mn=sn-4g5ednzz&ms=onl&mt=1573026070&mv=m
Request Chain 255
  • https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=5&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=pause&ns_st_po=6133&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=6133&ns_st_dpt=6133&ns_st_ipt=6133&ns_st_et=6133&ns_st_det=6133&ns_st_upc=6133&ns_st_dupc=6133&ns_st_iupc=6133&ns_st_upa=6133&ns_st_dupa=6133&ns_st_iupa=6133&ns_st_lpc=6133&ns_st_dlpc=6133&ns_st_lpa=6133&ns_st_dlpa=6133&ns_st_pa=6396&ns_ts=1573026229642&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=1&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0 HTTP 302
  • https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=5&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=pause&ns_st_po=6133&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=6133&ns_st_dpt=6133&ns_st_ipt=6133&ns_st_et=6133&ns_st_det=6133&ns_st_upc=6133&ns_st_dupc=6133&ns_st_iupc=6133&ns_st_upa=6133&ns_st_dupa=6133&ns_st_iupa=6133&ns_st_lpc=6133&ns_st_dlpc=6133&ns_st_lpa=6133&ns_st_dlpa=6133&ns_st_pa=6396&ns_ts=1573026229642&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=1&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0
Request Chain 256
  • https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=6&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=end&ns_st_po=6133&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=6133&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=6134&ns_st_det=1&ns_st_upc=6133&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=6133&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=6133&ns_st_dlpc=0&ns_st_lpa=6133&ns_st_dlpa=0&ns_st_pa=6396&ns_ts=1573026229643&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=0&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0 HTTP 302
  • https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=6&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=end&ns_st_po=6133&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=6133&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=6134&ns_st_det=1&ns_st_upc=6133&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=6133&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=6133&ns_st_dlpc=0&ns_st_lpa=6133&ns_st_dlpa=0&ns_st_pa=6396&ns_ts=1573026229643&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=0&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0
Request Chain 257
  • https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=7&ns_st_sp=1&ns_st_sc=2&ns_st_psq=3&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=2&ns_st_spc=2&ns_st_cn=1&ns_st_ev=play&ns_st_po=0&ns_st_cl=189000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=0&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=0&ns_st_det=0&ns_st_upc=263&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=0&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=263&ns_st_dlpc=0&ns_st_lpa=0&ns_st_dlpa=0&ns_st_pa=6396&ns_ts=1573026229643&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0 HTTP 302
  • https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=7&ns_st_sp=1&ns_st_sc=2&ns_st_psq=3&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=2&ns_st_spc=2&ns_st_cn=1&ns_st_ev=play&ns_st_po=0&ns_st_cl=189000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=0&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=0&ns_st_det=0&ns_st_upc=263&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=0&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=263&ns_st_dlpc=0&ns_st_lpa=0&ns_st_dlpa=0&ns_st_pa=6396&ns_ts=1573026229643&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0
Request Chain 262
  • https://js.spotx.tv/directsdk/v1/265228.js HTTP 307
  • https://aka.spotxcdn.com/integration/directsdk/v1/directsdk.js
Request Chain 270
  • https://sync.search.spotxchange.com/partner?source=dados HTTP 302
  • https://sync.search.spotxchange.com/partner?source=dados&__user_check__=1&sync_id=2dd4cc36-0069-11ea-9cab-1eddb0c52506

270 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html
www.computerworld.com/article/3451956/
Redirect Chain
  • http://edt.cio.com/c/17SnD46y7dFmQBZvUeVsNeMhSDeu
  • https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80...
140 KB
38 KB
Document
General
Full URL
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
b8587c7600d6eb9ab58b7e7ce49bec489c08a80b3f41ef453059ea6efd57c900

Request headers

:method
GET
:authority
www.computerworld.com
:scheme
https
:path
/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

status
200
server
Apache-Coyote/1.1
content-type
text/html;charset=UTF-8
content-encoding
gzip
accept-ranges
bytes bytes bytes
via
1.1 varnish 1.1 varnish
age
9455 0 9455
date
Wed, 06 Nov 2019 07:43:40 GMT
set-cookie
fastlyCountryCode=DE
x-served-by
cache-sjc3144-SJC, cache-sjc3144-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
x-cache
HIT, HIT, MISS, MISS
x-cache-hits
4, 4, 0, 0
x-timer
S1573026220.399048,VS0,VE145
vary
Accept-Encoding,Cookie
x-via-fastly
Verdad
x-vcl-version
92
content-length
38543

Redirect headers

Location
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Content-Length
0
Accept-Ranges
bytes
Date
Wed, 06 Nov 2019 07:43:40 GMT
Via
1.1 varnish
Age
2838
Connection
keep-alive
X-Served-By
cache-hhn4032-HHN
X-Cache
HIT
X-Cache-Hits
1
X-Timer
S1573026220.380879,VS0,VE0
jquery-1.10.2.min.js
www.computerworld.com/www/js/jquery/
91 KB
32 KB
Script
General
Full URL
https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
b52e06f854795718703ef9723b47a9a23edcbe2ae53ff261926d8d6059056cfe

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
516603
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
10, 10, 3, 3
content-length
32790
x-via-fastly
Verdad
x-served-by
cache-sjc3141-SJC, cache-sjc3141-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:12 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.562885,VS0,VE0
etag
W/"93639-1572467652000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 06:09:56 GMT
jquery_cookie.js
www.computerworld.com/www/js/jquery/
2 KB
1 KB
Script
General
Full URL
https://www.computerworld.com/www/js/jquery/jquery_cookie.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
02d2940a00290f3a9e4955de7821626688c0cacde8c97c762838e6b40ab22926

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
490487
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
34, 34, 3, 3
content-length
908
x-via-fastly
Verdad
x-served-by
cache-sjc3149-SJC, cache-sjc3149-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:14 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.565638,VS0,VE0
etag
W/"1946-1572467654000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 13:25:00 GMT
apollo-locales.js
www.computerworld.com/www/js/
4 KB
2 KB
Script
General
Full URL
https://www.computerworld.com/www/js/apollo-locales.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
b84ac0cba0a1486af49abffafbd06bfe822297ae2f798e23670c97fdb908643e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
14001
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 4, 4
content-length
1330
x-via-fastly
Verdad
x-served-by
cache-sjc3143-SJC, cache-sjc3143-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:17:46 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.565625,VS0,VE0
etag
W/"3676-1572981466000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Wed, 13 Nov 2019 01:46:35 GMT
cmp_shim.js
d2zv5rkii46miq.cloudfront.net/0/latest/
4 KB
2 KB
Script
General
Full URL
https://d2zv5rkii46miq.cloudfront.net/0/latest/cmp_shim.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:21f3:7c00:17:5578:e080:21 , United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
120fb2279d5061dd4a428f935fdf10c09e95c1f2ec0346f7aaf6c8b7f382cf49

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:29:58 GMT
content-encoding
gzip
last-modified
Fri, 06 Sep 2019 15:33:38 GMT
server
AmazonS3
age
4254
etag
"1de86d90311bcd5ee000f2f732b294a9"
x-cache
Hit from cloudfront
content-type
application/javascript
status
200
x-amz-cf-pop
FRA2-C2
accept-ranges
bytes
content-length
1698
via
1.1 27f665df26bde4a7226480b4a2890ff9.cloudfront.net (CloudFront)
x-amz-cf-id
pqWNfvfKQyob7mcIdYBanBz_qO9KzruUvXRRAXbf0hOgFe3tifWfzA==
messaging.js
www.computerworld.com/www/js/
320 KB
69 KB
Script
General
Full URL
https://www.computerworld.com/www/js/messaging.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
b8932ea45d9e6be8c2bb5c87a77aca424d473366a6dc295bdb88ab5a2aed9e26

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
444144
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
44, 44, 3864, 3864
content-length
70595
x-via-fastly
Verdad
x-served-by
cache-sjc3150-SJC, cache-sjc3150-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Thu, 31 Oct 2019 18:18:28 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.565622,VS0,VE0
etag
W/"327421-1572545908000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Fri, 08 Nov 2019 02:17:09 GMT
idg.js
cdn.blueconic.net/
126 KB
38 KB
Script
General
Full URL
https://cdn.blueconic.net/idg.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.204.101.120 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-143-204-101-120.fra50.r.cloudfront.net
Software
Apache /
Resource Hash
40a37e3c9ee0e4e0a324c344a876f62f30d7ed9be32adbfdb705cc46dfe8daa9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:37:49 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
age
351
x-cache
Hit from cloudfront
status
200
content-length
38647
x-xss-protection
1; mode=block
last-modified
Thu, 26 Sep 2019 15:48:48 GMT
server
Apache
etag
"1f7f2-59376b494f818-gzip"
vary
Accept-Encoding
content-type
text/javascript; charset=utf-8
via
1.1 5d8c59c4e33ff30f6610982ac8ad0232.cloudfront.net (CloudFront)
cache-control
public, max-age=600, s-maxage=500
x-amz-cf-pop
FRA50-C1
accept-ranges
bytes
x-robots-tag
noindex, nofollow
x-amz-cf-id
3WLyOKn8xQh2EBvKTiVaGkqz4LcLezMG9LEj1W0OtxSu5lLVuUEsyA==
init_device.js
www.computerworld.com/www/js/
585 B
628 B
Script
General
Full URL
https://www.computerworld.com/www/js/init_device.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
4f4ed0e81c2f0016d06ae816dd872edc04e97612c9d36f2f3f4475f2954e7fcc

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
259112
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 3, 3
content-length
304
x-via-fastly
Verdad
x-served-by
cache-sjc3137-SJC, cache-sjc3137-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Thu, 31 Oct 2019 18:18:46 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.565602,VS0,VE0
etag
W/"585-1572545926000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Sun, 10 Nov 2019 05:38:44 GMT
iasPET.1.js
cdn.adsafeprotected.com/
19 KB
6 KB
Script
General
Full URL
https://cdn.adsafeprotected.com/iasPET.1.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.224.196.57 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-224-196-57.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
0e9324325e7bad86597c91ee8cf9e7f6bc0b83c6e03f29415e48511d19e64856

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Thu, 31 Oct 2019 21:15:40 GMT
Content-Encoding
gzip
Connection
keep-alive
Last-Modified
Mon, 21 Oct 2019 17:06:03 GMT
Server
AmazonS3
Age
469680
Vary
Accept-Encoding
X-Cache
Hit from cloudfront
Content-Type
application/javascript
Via
1.1 d7e55181ad8192e74c103c6003cd4d9c.cloudfront.net (CloudFront)
Cache-Control
max-age=604800
Transfer-Encoding
chunked
X-Amz-Cf-Pop
FRA2-C1
X-Amz-Cf-Id
j-kYfQIjl32Rp3tIHng0DcnFsxKCoqEDaOUiTXfGSsRGNxEWr00d_w==
183980-32335169869501.js
js-sec.indexww.com/ht/p/
110 KB
33 KB
Script
General
Full URL
https://js-sec.indexww.com/ht/p/183980-32335169869501.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.69.96 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-69-96.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
9c475e04e541eaeea511b53598b8e115774bfa607f4459a3336ff57cc084cb4e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:40 GMT
Content-Encoding
gzip
Last-Modified
Wed, 06 Nov 2019 07:20:23 GMT
Server
Apache
ETag
"9022ed-1b77c-596a861d1ee1f"
Vary
Accept-Encoding
P3P
policyref="/w3c/p3p.xml", CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Cache-Control
max-age=2362
Connection
keep-alive
Accept-Ranges
bytes
Content-Type
text/javascript
Content-Length
33265
Expires
Wed, 06 Nov 2019 08:23:02 GMT
gpt_includes.js
www.computerworld.com/www/js/ads/
18 KB
5 KB
Script
General
Full URL
https://www.computerworld.com/www/js/ads/gpt_includes.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
ffc4c046b73cd1c8d52b507d522fe23f19ec3290a48e3963d31bda584de5c9f5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
36411
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 3, 3
content-length
5109
x-via-fastly
Verdad
x-served-by
cache-sjc3139-SJC, cache-sjc3139-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:17:22 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.565600,VS0,VE0
etag
W/"18330-1572981442000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:33:09 GMT
thm_pre.js
www.computerworld.com/www.idge/js/
23 KB
5 KB
Script
General
Full URL
https://www.computerworld.com/www.idge/js/thm_pre.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
432e0262764192d1d2fe77b5ea2fc06218eebbac5800fc568f507891bc4710da

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
36278
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
21, 21, 3, 3
content-length
4970
x-via-fastly
Verdad
x-served-by
cache-sjc3120-SJC, cache-sjc3120-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:14:36 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.565585,VS0,VE0
etag
W/"23063-1572981276000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:35:28 GMT
gpt_starter.js
www.computerworld.com/www/js/ads/
330 B
481 B
Script
General
Full URL
https://www.computerworld.com/www/js/ads/gpt_starter.js?1234
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
ad20d2d42fcbd58ad9c50a6e53db21bf4425be6f8237a41f109c2717c30b4067

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
442116
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
13, 13, 2, 2
content-length
238
x-via-fastly
Verdad
x-served-by
cache-sjc3146-SJC, cache-sjc3146-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Thu, 31 Oct 2019 18:18:20 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.570195,VS0,VE0
etag
W/"330-1572545900000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Fri, 08 Nov 2019 02:51:09 GMT
ias_gpt_launcher.js
www.computerworld.com/www/js/ads/
1 KB
879 B
Script
General
Full URL
https://www.computerworld.com/www/js/ads/ias_gpt_launcher.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
0afbd1c3e2da712bb4843aed36d9341b9ff3203b38826ffdf2bee00d2b4673c1

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
36419
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 3, 3
content-length
555
x-via-fastly
Verdad
x-served-by
cache-sjc3149-SJC, cache-sjc3149-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:17:18 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.570179,VS0,VE0
etag
W/"1196-1572981438000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:33:09 GMT
select2.css
www.computerworld.com/www.idge.ans/js/select2-3.5.0/
15 KB
3 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge.ans/js/select2-3.5.0/select2.css
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f91649026d2a05a646860a4be36a5388d5c78b4afc03f5ecd49adcad3c4449c3

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
105833
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
29, 29, 5, 5
content-length
2748
x-via-fastly
Verdad
x-served-by
cache-sjc3130-SJC, cache-sjc3130-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Mon, 04 Nov 2019 19:25:42 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.565190,VS0,VE0
etag
W/"15679-1572895542000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 00:16:15 GMT
article.css
www.computerworld.com/www/css/
231 KB
34 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www/css/article.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
4991392310910e93436471e2d799d6eeccfc4108fc686c31fa28158fb2e6ff53

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
36278
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
16, 16, 6, 6
content-length
34236
x-via-fastly
Verdad
x-served-by
cache-sjc3125-SJC, cache-sjc3125-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:15:30 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.565238,VS0,VE0
etag
W/"236624-1572981330000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:35:28 GMT
insider-promo-styles.css
www.computerworld.com/www.idge/css/
7 KB
2 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge/css/insider-promo-styles.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
38d4510c34bf1c09a3f7bac5337fd42b04e5f4355db6d5e4f16c5f38672da6ea

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
36275
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
17, 17, 5, 5
content-length
1717
x-via-fastly
Verdad
x-served-by
cache-sjc3122-SJC, cache-sjc3122-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:15:44 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.565241,VS0,VE0
etag
W/"7593-1572981344000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:35:28 GMT
article.css
www.computerworld.com/www.idge.ctw/css/
80 KB
10 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge.ctw/css/article.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
0c07b034e352fdc7fb38a73e41c2b5f2fa05a9f36b21fbca7b1dfc50c0f051d5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
14185
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
20, 20, 5, 5
content-length
9825
x-via-fastly
Verdad
x-served-by
cache-sjc3140-SJC, cache-sjc3140-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:15:20 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.565426,VS0,VE0
etag
W/"81797-1572981320000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Wed, 13 Nov 2019 01:43:44 GMT
ss-social.css
www.computerworld.com/www.idge/css/webfonts/
3 KB
1 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge/css/webfonts/ss-social.css
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
c2787f84ac525e6b202f56eb25ef03f40017d11100280dd6f3866cadb4d1f50c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
421061
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
6, 6, 5, 5
content-length
906
x-via-fastly
Verdad
x-served-by
cache-sjc3150-SJC, cache-sjc3150-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Thu, 31 Oct 2019 18:16:42 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.565430,VS0,VE0
etag
W/"3417-1572545802000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Fri, 08 Nov 2019 08:42:10 GMT
ss-standard.css
www.computerworld.com/www.idge/css/webfonts/
11 KB
3 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge/css/webfonts/ss-standard.css
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
b59054e128a42511aa22399d02cd8365ac1c66a6efe6f4f11cfe1ae16284db0c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
241609
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
10, 10, 6, 6
content-length
2488
x-via-fastly
Verdad
x-served-by
cache-sjc3142-SJC, cache-sjc3142-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Thu, 31 Oct 2019 18:16:44 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.565409,VS0,VE0
etag
W/"11639-1572545804000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Sun, 10 Nov 2019 10:33:13 GMT
all.css
use.fontawesome.com/releases/v5.6.1/css/
52 KB
13 KB
Stylesheet
General
Full URL
https://use.fontawesome.com/releases/v5.6.1/css/all.css
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.111.9.35 Phoenix, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
453893f7daa3d8fe9716f8c6d0f36f8ade8cacfc0093e164f4f998b46427959e

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
last-modified
Wed, 12 Dec 2018 17:44:03 GMT
server
NetDNA-cache/2.2
status
200
etag
W/"b8085bf2c839791244bd95f56fb93c01"
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
access-control-allow-methods
GET
content-type
text/css
access-control-allow-origin
*
access-control-max-age
3000
cache-control
max-age=31556926
x-cache
HIT
cav2eef.css
use.typekit.net/
9 KB
1 KB
Stylesheet
General
Full URL
https://use.typekit.net/cav2eef.css
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
4ea52185e69db285388a469849af2a50e38a7584915fea49ccbb7f9ace34ec26
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubDomains;
content-encoding
gzip
server
nginx
status
200
date
Wed, 06 Nov 2019 07:43:40 GMT
vary
Accept-Encoding
content-type
text/css;charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=600, stale-while-revalidate=604800
timing-allow-origin
*
content-length
1122
select2.js
www.computerworld.com/www.idge.ans/js/select2-3.5.0/
77 KB
19 KB
Script
General
Full URL
https://www.computerworld.com/www.idge.ans/js/select2-3.5.0/select2.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f88f33a736ef0e7d27d78a7b2cdadb674ac192db9aede3a42c65ea1fd4386114

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
326609
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 3, 3
content-length
19639
x-via-fastly
Verdad
x-served-by
cache-sjc3142-SJC, cache-sjc3142-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Thu, 31 Oct 2019 18:18:00 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.570169,VS0,VE0
etag
W/"79220-1572545880000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Sat, 09 Nov 2019 10:54:49 GMT
alc_hashes.js
www.computerworld.com/www/js/utils/
25 KB
9 KB
Script
General
Full URL
https://www.computerworld.com/www/js/utils/alc_hashes.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
db33949c354930ab2bc413270504c302a1b724c6d8403827f4423a78875eeb9b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
512487
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
15, 15, 3, 3
content-length
9201
x-via-fastly
Verdad
x-served-by
cache-sjc3135-SJC, cache-sjc3135-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:18 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.570201,VS0,VE0
etag
W/"25218-1572467658000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 07:18:02 GMT
insider_reg_api.js
www.computerworld.com/www/js/insider/
60 KB
22 KB
Script
General
Full URL
https://www.computerworld.com/www/js/insider/insider_reg_api.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
207c61e54e03245104c55ae42aa5340dfe8664ec2b44763f003f6ae924a62175

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
36419
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 3, 3
content-length
21704
x-via-fastly
Verdad
x-served-by
cache-sjc3131-SJC, cache-sjc3131-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:17:40 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.570255,VS0,VE0
etag
W/"61880-1572981460000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:33:09 GMT
jquery.maskedinput-1.4.min.js
www.computerworld.com/www/js/insider/
4 KB
2 KB
Script
General
Full URL
https://www.computerworld.com/www/js/insider/jquery.maskedinput-1.4.min.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
d61ee6f4c7b8572833d3bdad303493033c896a58ca134680319e3c4bef8756bb

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
502159
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
52, 52, 3, 3
content-length
1852
x-via-fastly
Verdad
x-served-by
cache-sjc3129-SJC, cache-sjc3129-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:22 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.570307,VS0,VE0
etag
W/"4139-1572467662000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 10:10:47 GMT
ads.js
www.computerworld.com/www/js/ads/
19 B
296 B
Script
General
Full URL
https://www.computerworld.com/www/js/ads/ads.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
6a0f6cf6b4648c192d81b5fc7b70cb2f6819ef4a799e421e8626cae9697aa85a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
522428
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
85, 85, 4, 4
content-length
39
x-via-fastly
Verdad
x-served-by
cache-sjc3150-SJC, cache-sjc3150-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:04 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.570316,VS0,VE0
etag
W/"19-1572467644000"
vary
Cookie, Accept-Encoding
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 04:32:57 GMT
load.js
s.ntv.io/serve/
302 KB
90 KB
Script
General
Full URL
https://s.ntv.io/serve/load.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.69.197 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-69-197.deploy.static.akamaitechnologies.com
Software
AmazonS3 /
Resource Hash
7ac551c78b2e3f14fa4d2470d662b314de4dc008204fed17404ca4e2947a77e4

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:40 GMT
Content-Encoding
gzip
x-amz-request-id
2D6392662C4A9E47
x-amz-server-side-encryption
AES256
Transfer-Encoding
chunked
Connection
keep-alive, Transfer-Encoding
x-amz-id-2
PIAW+YnQ/85mozrTpvJPqdNxyAuENyDpfciEQpHzM48cO/RuNlNtQNBa9DbQaInlQrDIE11w6tc=
Last-Modified
Wed, 06 Nov 2019 00:45:55 GMT
Server
AmazonS3
ETag
"0cba66609c095baf3fc6a4c023a8aa9c"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=3600
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
oc-header.css
www.computerworld.com/www/css/
36 KB
7 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www/css/oc-header.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
304224b9e870d344e3d6ceef9b6634324b6d1ebe2030262344bfd9a92f4b193a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
36267
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 5, 5
content-length
7171
x-via-fastly
Verdad
x-served-by
cache-sjc3144-SJC, cache-sjc3144-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:15:26 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.565669,VS0,VE0
etag
W/"36806-1572981326000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:35:35 GMT
oc-header.css
www.computerworld.com/www.idge.ctw/css/
10 KB
3 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge.ctw/css/oc-header.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
66a087f40546676b05722792e553fcaa9c62b877b8fba1d4000adc89d5b179d2

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
36287
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 6, 6
content-length
2632
x-via-fastly
Verdad
x-served-by
cache-sjc3148-SJC, cache-sjc3148-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:15:16 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.565669,VS0,VE0
etag
W/"10229-1572981316000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:35:20 GMT
computerworld-np-logo.svg
alt.idgesg.net/images/furniture/computerworld/
5 KB
5 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/computerworld/computerworld-np-logo.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
fbde5f5195daee9344171d4b753ec948c89c78fae738c85662432d2479a582ca

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
VXJsmyyqi4vY7mR.hRFZCUDOCbFB9IKX
via
1.1 varnish, 1.1 varnish
etag
"b91b6866cc8b3a705dea84d8bd5c6297"
age
5434
x-amz-meta-origin-date-iso8601
2019-03-28T14:19:52.000Z
x-cache
HIT, HIT
status
200
content-length
4705
x-amz-id-2
P434pFC5Tk99QtU04vZfr3Ht0brQEsEojipTqZ7J4EPoW3mzN784daCG0CWS+coJe0pbgHd4Z60=
x-served-by
cache-jfk8127-JFK, cache-fra19164-FRA
last-modified
Thu, 28 Mar 2019 14:46:20 GMT
server
AmazonS3
x-timer
S1573026221.832371,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:40 GMT
x-amz-request-id
E632B841C6BEEA05
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
3, 1
content-ribbon.css
www.computerworld.com/www/css/
2 KB
836 B
Stylesheet
General
Full URL
https://www.computerworld.com/www/css/content-ribbon.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
fd66d8dc41c06a99c3877934b3af8d38de72f3a94db252c0b9474bec35014491

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
36419
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 5, 5
content-length
522
x-via-fastly
Verdad
x-served-by
cache-sjc3142-SJC, cache-sjc3142-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:15:24 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.597760,VS0,VE0
etag
W/"1829-1572981324000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:33:09 GMT
date-time-moments.js
www.computerworld.com/www/js/
121 KB
32 KB
Script
General
Full URL
https://www.computerworld.com/www/js/date-time-moments.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
5156e9286b87b1e03f6151c2bb29ad54d2b9da4df874a23c742a0693bdc209a1

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
525972
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
7, 7, 3, 3
content-length
32313
x-via-fastly
Verdad
x-served-by
cache-sjc3143-SJC, cache-sjc3143-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:16 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.618253,VS0,VE0
etag
W/"123832-1572467656000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 03:29:44 GMT
twitter.svg
idge.staticworld.net/images/
1 KB
1 KB
Image
General
Full URL
https://idge.staticworld.net/images/twitter.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
464e7cde418a559c5035942d1ab154d5d906f378f256a0dd39848d197df6180d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
mIV1aQJqOkkgyHLgPXYdWBvfLAAcgw1y
via
1.1 varnish, 1.1 varnish
etag
"5c2cee17abf8296b156fa142e69516df"
age
3714
x-cache
HIT, HIT
status
200
content-length
1128
x-amz-id-2
y1hKCIBYJOnpaIKlXNbXsyGRlEdbfAdaMm32v6LYDPBVw7Gb7kXcEJYx3qGJ6Z+UrbB2+kqv6bc=
x-served-by
cache-jfk8144-JFK, cache-hhn4042-HHN
last-modified
Tue, 27 Mar 2018 00:10:11 GMT
server
AmazonS3
x-timer
S1573026221.875117,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:40 GMT
x-amz-request-id
0E4917FDB65E6E74
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
1, 3
facebook.svg
idge.staticworld.net/images/
817 B
1 KB
Image
General
Full URL
https://idge.staticworld.net/images/facebook.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
676aa6d4090a54ea6893484095f55c80659fb8538db100cdb8ce1dc82bab42b8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
z0fEqr9qBUOYVzkAEhE7W.44xxx.2BcQ
via
1.1 varnish, 1.1 varnish
etag
"e54119fb283fa31d7980c946d19e701f"
age
2893
x-cache
HIT, HIT
status
200
content-length
817
x-amz-id-2
PAo7jP/TPINy3/PF5IcELqQrx5WV1YGhkTAK2yydftTzCGKFrombJzrjwPr5ITwj91fXoiLIoJU=
x-served-by
cache-jfk8151-JFK, cache-hhn4042-HHN
last-modified
Tue, 27 Mar 2018 00:10:09 GMT
server
AmazonS3
x-timer
S1573026221.875096,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:40 GMT
x-amz-request-id
CE0402E6E84346E9
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
20, 2
linkedin.svg
idge.staticworld.net/images/
786 B
1 KB
Image
General
Full URL
https://idge.staticworld.net/images/linkedin.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
03643efcf63e8fbfe6571cd0f1a4ce49f8575a7bee74f2e9fd7fab344e474e48

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
dIfJAJb7rR9o.DnrV3iep_mz2NuSUCHZ
via
1.1 varnish, 1.1 varnish
etag
"b828f13d2d6015e831f675f1ca0c1908"
age
2687
x-cache
HIT, HIT
status
200
content-length
786
x-amz-id-2
Nuv6U+GJ4MTh86RIEkvWtm+YxzK3NNzAWTUM+YNgqNhdeIUKfM4NoNoUQr4bi4ymE52b0E3wqz8=
x-served-by
cache-jfk8122-JFK, cache-hhn4042-HHN
last-modified
Tue, 27 Mar 2018 00:10:10 GMT
server
AmazonS3
x-timer
S1573026221.875131,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:40 GMT
x-amz-request-id
28192911DD0FF8BA
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
6, 1
reddit.svg
idge.staticworld.net/images/
2 KB
2 KB
Image
General
Full URL
https://idge.staticworld.net/images/reddit.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
47c749c888c850505d68f2745651928d8aec9a6802d6a8b20869fa114af92277

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
X1o6g.mfoioyv5Lswf3F9n.2ID0CCWF9
via
1.1 varnish, 1.1 varnish
etag
"8159d85ae759a8d251edb65b4dcd285d"
age
5521
x-cache
HIT, HIT
status
200
content-length
1556
x-amz-id-2
DGsKZrrnALU3z5jwOlnClRd3XNZbzn0aaesXxau92bgkhepB1HvzbLFdvXsIH0ADTPpvzUw10pY=
x-served-by
cache-jfk8134-JFK, cache-hhn4042-HHN
last-modified
Tue, 27 Mar 2018 00:10:10 GMT
server
AmazonS3
x-timer
S1573026221.875044,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:40 GMT
x-amz-request-id
7BD513E1C3D27790
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
24, 13
mail.svg
idge.staticworld.net/images/
631 B
891 B
Image
General
Full URL
https://idge.staticworld.net/images/mail.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
83d86c9e7359ed844c0e7682abcd5cdb65222d421c61156f17791ac6c2650274

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
W1fLolU3CaghgVscFveqAiphPY036Sqp
via
1.1 varnish, 1.1 varnish
etag
"c8fc97e05e008a042825f64ee7d414d1"
age
4209
x-cache
HIT, HIT
status
200
content-length
631
x-amz-id-2
r7JUpm1jygvMBzExuc1aDFqhlRTbQ2fIVy5NMQ/zxDgtP6voE0NG8WgeM9/aip8NFxDJLM9W8ko=
x-served-by
cache-jfk8140-JFK, cache-hhn4042-HHN
last-modified
Tue, 27 Mar 2018 00:10:10 GMT
server
AmazonS3
x-timer
S1573026221.875093,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:40 GMT
x-amz-request-id
CE4A58FB8F65E109
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
10, 18
print.svg
idge.staticworld.net/images/
782 B
1 KB
Image
General
Full URL
https://idge.staticworld.net/images/print.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1b197985c0bef8bc365381bd16e15dccf184eb33d0abf0afdb4f567da2000fb2

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
.7Gmo7QCRJqJTxCocIfBynAqOGj25mL.
via
1.1 varnish, 1.1 varnish
etag
"a9f65e3b5eddc5c537118a146a3333c7"
age
6301
x-cache
HIT, HIT
status
200
content-length
782
x-amz-id-2
mVzOi+RHspq7jQMPALTsbZf2lcNHfh0kG/si5fUH1RQ3cJ9935Y/yQLTT+zqgHXOda2wec6yD9o=
x-served-by
cache-jfk8126-JFK, cache-hhn4042-HHN
last-modified
Tue, 27 Mar 2018 00:10:10 GMT
server
AmazonS3
x-timer
S1573026221.874938,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:40 GMT
x-amz-request-id
46D6EC99850912FE
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
6, 13
stickyLb.js
www.computerworld.com/www/js/ads/
4 KB
1 KB
Script
General
Full URL
https://www.computerworld.com/www/js/ads/stickyLb.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f6bbd3540733be952a2921b2e4716d3b5190d5897510efcf9baa09649a1eaedf

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
499081
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 3, 3
content-length
1257
x-via-fastly
Verdad
x-served-by
cache-sjc3128-SJC, cache-sjc3128-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:02 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.621993,VS0,VE0
etag
W/"3657-1572467642000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 10:58:46 GMT
deal-modules.js
www.computerworld.com/www/js/
783 B
565 B
Script
General
Full URL
https://www.computerworld.com/www/js/deal-modules.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
cdf2700459ab474c9e19ccf7a3b9c6044a6cf2f2ff7bb0e1ab7bde2304409c87

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
433616
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
4, 4, 3, 3
content-length
345
x-via-fastly
Verdad
x-served-by
cache-sjc3141-SJC, cache-sjc3141-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Thu, 31 Oct 2019 18:18:22 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.625218,VS0,VE0
etag
W/"783-1572545902000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Fri, 08 Nov 2019 05:13:05 GMT
get_site_data
cmp.computerworld.com/
19 B
256 B
XHR
General
Full URL
https://cmp.computerworld.com/get_site_data?account_id=146&href=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&requestUUID=e799953a-939c-42bd-a71f-ea17a34e781b-1573026220650
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/messaging.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.194.227.247 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-194-227-247.eu-central-1.compute.amazonaws.com
Software
Jetty(9.4.2.v20170220) /
Resource Hash
7301e4c498be91461d67a037fa33683168f7f313060ca9c0e3eede9782192daf

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
x-sp-mms-node
mms-aka.node.fra.consul
server
Jetty(9.4.2.v20170220)
status
200
access-control-allow-methods
GET
content-type
text/plain
access-control-allow-origin
https://www.computerworld.com
cache-control
max-age=2592000
access-control-allow-credentials
true
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
76 KB
15 KB
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&bcsessionid=&bctempid=&overruleReferrer=&time=2019-11-06T08%3A43%3A40%2B01%3A00&ts=1573026220666
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.81.224.214 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-81-224-214.compute-1.amazonaws.com
Software
- /
Resource Hash
1683fa45d5e9874634fa99c351fb30789aab4cf1156a314e598827b7fce9c2f0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
14794
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
identity
api.rlcdn.com/api/
0
0

rid
match.adsrvr.org/track/
109 B
542 B
XHR
General
Full URL
https://match.adsrvr.org/track/rid?ttd_pid=casale&fmt=json&p=183980
Requested by
Host: js-sec.indexww.com
URL: https://js-sec.indexww.com/ht/p/183980-32335169869501.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.154.201.99 Dublin, Ireland, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-54-154-201-99.eu-west-1.compute.amazonaws.com
Software
/
Resource Hash
5fa6f0ab322f91eabb3badb4d7f1bb5c2129d34faa5311edc069131e729ee85f

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
application/x-www-form-urlencoded; charset=UTF-8

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
x-aspnet-version
4.0.30319
status
200
vary
Origin
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
private
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Content-Length, Content-Encoding, Vary, Cache-Control, Accept
content-length
109
expires
Fri, 06 Dec 2019 07:43:40 GMT
gpt.js
securepubads.g.doubleclick.net/tag/js/
48 KB
15 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/tag/js/gpt.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/ads/gpt_starter.js?1234
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
sffe /
Resource Hash
1af6a0ce54967db44d13cf01ff4368ff02bc5c322dde54fd7222992acc670f2d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"328 / 222 of 1000 / last-modified: 1572985346"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
15465
x-xss-protection
0
expires
Wed, 06 Nov 2019 07:43:40 GMT
print.css
www.computerworld.com/www.idge/css/
2 KB
1 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge/css/print.css
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
a5e5c781317ce492049cb1f9e1deec67c47bbe5dbd03ec12f688cf7a221a79f2

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
528196
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
4, 4, 5, 5
content-length
733
x-via-fastly
Verdad
x-served-by
cache-sjc3139-SJC, cache-sjc3139-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:32:28 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.720252,VS0,VE0
etag
W/"1871-1572467548000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 02:56:29 GMT
p.css
p.typekit.net/
5 B
168 B
Stylesheet
General
Full URL
https://p.typekit.net/p.css?s=1&k=cav2eef&ht=tk&f=2007.2008.2009.2010.2011.6808.6809.8415.6846.6847.6848.6851&a=25545821&app=typekit&e=css
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
1c0ff118a4290c99f39c90abb38703a866e47251b23cca20266c69c812ccafeb

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
last-modified
Mon, 04 Feb 2019 20:01:41 GMT
server
nginx
etag
"5c589a25-5"
status
200
content-type
text/css
access-control-allow-origin
*
cache-control
max-age=604800
accept-ranges
bytes
content-length
5
expires
Wed, 08 May 2019 15:16:03 GMT
gdpr-status
sourcepoint.mgr.consensu.org/consent/v2/
43 B
324 B
XHR
General
Full URL
https://sourcepoint.mgr.consensu.org/consent/v2/gdpr-status?siteId=3919
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/messaging.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.123.110.218 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-3-123-110-218.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
1e8e9b90a66e1741a5300ee65d6fab837aab5c3f0a32a523d85002ae53154c9c

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
status
200
access-control-allow-methods
GET, PUT, POST, DELETE
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Accept, Authorization
content-length
43
get_loaders
cmp.computerworld.com/mms/
552 B
791 B
XHR
General
Full URL
https://cmp.computerworld.com/mms/get_loaders?href=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&account_id=146&requestUUID=e799953a-939c-42bd-a71f-ea17a34e781b-1573026220650
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/messaging.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.194.227.247 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-194-227-247.eu-central-1.compute.amazonaws.com
Software
Jetty(9.4.2.v20170220) /
Resource Hash
708f2f6a1e23c0ef47ab8e948a239163724d874d8b6cf8c9d4f85302f45fa3e1

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
x-sp-mms-node
mms-aka.node.fra.consul
server
Jetty(9.4.2.v20170220)
status
200
access-control-allow-methods
GET
content-type
application/json
access-control-allow-origin
https://www.computerworld.com
cache-control
max-age=10800
access-control-allow-credentials
true
embedder-jwp.js
www.computerworld.com/www/js/video/
2 KB
878 B
Script
General
Full URL
https://www.computerworld.com/www/js/video/embedder-jwp.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f0b97fc49950832323730d508911fa12bd098eca0670ccb3a18ada5af3a34699

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
36363
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
3, 3, 4, 4
content-length
640
x-via-fastly
Verdad
x-served-by
cache-sjc3128-SJC, cache-sjc3128-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:17:44 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.718035,VS0,VE0
etag
W/"1760-1572981464000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:33:09 GMT
tso-links.css
www.computerworld.com/www.idgcsmb/css/
991 B
716 B
Stylesheet
General
Full URL
https://www.computerworld.com/www.idgcsmb/css/tso-links.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
b42412a0e2fd452601f89dc9119e8dc4c563d204e6a54ba2f91e7c046f9de3a4

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
36299
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
24, 24, 6, 6
content-length
473
x-via-fastly
Verdad
x-served-by
cache-sjc3145-SJC, cache-sjc3145-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:14:54 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.718035,VS0,VE0
etag
W/"991-1572981294000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:35:11 GMT
foot.css
www.computerworld.com/www.idge/css/
7 KB
2 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge/css/foot.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
8a767979bca69766fa34fd523e09d32633804e2560756d9c1d3c614574d94ab2

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
fastly-restarts
1
age
36285
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
3, 3, 5, 5
content-length
1600
x-via-fastly
Verdad
x-served-by
cache-sjc3137-SJC, cache-sjc3137-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:15:42 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.719127,VS0,VE0
etag
W/"7225-1572981342000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:35:20 GMT
foot.css
www.computerworld.com/www.idge.ctw/css/
4 KB
1 KB
Stylesheet
General
Full URL
https://www.computerworld.com/www.idge.ctw/css/foot.css?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
bda519e2c1f6de2bd75b5f721ea1d93980ac32226ed6a23764878c5d255c832e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
36396
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 5, 5
content-length
1080
x-via-fastly
Verdad
x-served-by
cache-sjc3146-SJC, cache-sjc3146-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:15:16 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.719177,VS0,VE0
etag
W/"4482-1572981316000-gzip"
vary
Accept-Encoding,Cookie
content-type
text/css
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:33:09 GMT
logo-footer-white.png
alt.idgesg.net/images/logos/
2 KB
3 KB
Image
General
Full URL
https://alt.idgesg.net/images/logos/logo-footer-white.png
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
537d7a2ee55484fcb24cea45dd4593d1f478d83545b0399616af969a69c88c41

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
edGv5yqk7j95QLH6YobDRVsDJWVAgek8
via
1.1 varnish, 1.1 varnish
etag
"503ef0c72f7205129e4048cf0aea6fe9"
age
1137226
x-amz-meta-origin-date-iso8601
2018-07-16T13:16:57.000Z
x-cache
HIT, HIT
status
200
content-length
2259
x-amz-id-2
8r8cbkuT5JZ68yGQrmlSMnC7ewn6qxO9lg0VhydFVq2FXs7EIF6dCCkSY/4Ue61G5RFtVmFm67I=
x-served-by
cache-jfk8127-JFK, cache-fra19164-FRA
last-modified
Mon, 16 Jul 2018 13:17:37 GMT
server
AmazonS3
x-timer
S1573026221.832355,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:40 GMT
x-amz-request-id
989DC7847203244C
cache-control
public, max-age=2592000
accept-ranges
bytes
content-type
image/png
x-cache-hits
2, 5
jquery-ui.js
www.computerworld.com/www/js/jquery/
292 KB
70 KB
Script
General
Full URL
https://www.computerworld.com/www/js/jquery/jquery-ui.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
66b5ca68288cc2506f1c5709fe38cebccca428406a7ce96e392718203666d503

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
512476
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
4, 4, 5, 5
content-length
70949
x-via-fastly
Verdad
x-served-by
cache-sjc3120-SJC, cache-sjc3120-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:16 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.719169,VS0,VE0
etag
W/"299210-1572467656000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 07:18:45 GMT
jquery.dfp.min.js
www.computerworld.com/www/js/jquery/
4 KB
2 KB
Script
General
Full URL
https://www.computerworld.com/www/js/jquery/jquery.dfp.min.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
053d5c873a012d89c7a079d097426cfddb18b28494a55c51eff89e0294540dfd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
518511
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
9, 9, 5, 5
content-length
1750
x-via-fastly
Verdad
x-served-by
cache-sjc3149-SJC, cache-sjc3149-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:12 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.719225,VS0,VE0
etag
W/"4433-1572467652000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 05:37:42 GMT
shortstack_nav.js
www.computerworld.com/www.idge/js/mule/
2 KB
718 B
Script
General
Full URL
https://www.computerworld.com/www.idge/js/mule/shortstack_nav.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
fb6b1425ff73fe62d725a3981ac08d9f57e16e14d5ae321c617e21e1d7403d1f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
522404
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
5, 5, 5, 5
content-length
480
x-via-fastly
Verdad
x-served-by
cache-sjc3136-SJC, cache-sjc3136-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:42 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.719343,VS0,VE0
etag
W/"2129-1572467682000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 04:33:02 GMT
tracking.js
www.computerworld.com/www/js/analytics/
1 KB
833 B
Script
General
Full URL
https://www.computerworld.com/www/js/analytics/tracking.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
607bfd152e5c762ba0f0502f653c7bbb546ad7955e792a9840d4ae28a8219423

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
518829
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 5, 5
content-length
538
x-via-fastly
Verdad
x-served-by
cache-sjc3127-SJC, cache-sjc3127-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:06 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.719327,VS0,VE0
etag
W/"1075-1572467646000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 05:32:51 GMT
autocomplete.js
www.computerworld.com/www/js/
1 KB
846 B
Script
General
Full URL
https://www.computerworld.com/www/js/autocomplete.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
c7e1ddc2de3256e9b1db3c3733f38a74a9cdcbf1c424d559519f85cfe0e321ba

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
511246
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
6, 6, 5, 5
content-length
627
x-via-fastly
Verdad
x-served-by
cache-sjc3123-SJC, cache-sjc3123-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:16 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.719317,VS0,VE0
etag
W/"1254-1572467656000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 07:38:12 GMT
jquery.colorbox-min.js
www.computerworld.com/www.idge/js/jquery/plugins/
11 KB
5 KB
Script
General
Full URL
https://www.computerworld.com/www.idge/js/jquery/plugins/jquery.colorbox-min.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f370d6bd05df8e6a5b671f06e038c4d85d95dc5446fdeb8f8762e817882a8322

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
13795
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 5, 5
content-length
4634
x-via-fastly
Verdad
x-served-by
cache-sjc3138-SJC, cache-sjc3138-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:17:54 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.719625,VS0,VE0
etag
W/"11081-1572981474000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Wed, 13 Nov 2019 01:50:04 GMT
article.js
www.computerworld.com/www.idge/js/
2 KB
832 B
Script
General
Full URL
https://www.computerworld.com/www.idge/js/article.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
0dbf4106e062b56a7d4db32cb448fad76e1aad0bf204b8569091bdcb5abed21e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
36264
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 5, 5
content-length
613
x-via-fastly
Verdad
x-served-by
cache-sjc3121-SJC, cache-sjc3121-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:18:02 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.719600,VS0,VE0
etag
W/"1707-1572981482000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:35:30 GMT
responsive-tables.js
www.computerworld.com/www.idge/js/jquery/
1 KB
759 B
Script
General
Full URL
https://www.computerworld.com/www.idge/js/jquery/responsive-tables.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
a739dbffc4a907c1f133b4b26e0daf544ea743218bba5704a910313b0ef3ac10

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
433616
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 5, 5
content-length
541
x-via-fastly
Verdad
x-served-by
cache-sjc3143-SJC, cache-sjc3143-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Thu, 31 Oct 2019 18:18:58 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.719560,VS0,VE0
etag
W/"1363-1572545938000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Fri, 08 Nov 2019 05:12:31 GMT
jquery.tablesorter.min.js
www.computerworld.com/www.idge/js/jquery/
16 KB
5 KB
Script
General
Full URL
https://www.computerworld.com/www.idge/js/jquery/jquery.tablesorter.min.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
55e8d16bb1a291b0524928dd3bd20c191a14d8a947e4b141271f9c595c7bb451

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
516141
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
5, 5, 6, 6
content-length
4798
x-via-fastly
Verdad
x-served-by
cache-sjc3129-SJC, cache-sjc3129-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:38 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.719530,VS0,VE0
etag
W/"16373-1572467678000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 06:17:13 GMT
global.js
www.computerworld.com/www.idge/js/
9 KB
3 KB
Script
General
Full URL
https://www.computerworld.com/www.idge/js/global.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
dbb8ab3fce681d38bdad241e1a075f677816ef4c3862e73236e5e414ea8e3c23

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
36360
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 5, 5
content-length
2538
x-via-fastly
Verdad
x-served-by
cache-sjc3138-SJC, cache-sjc3138-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:17:52 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.719513,VS0,VE0
etag
W/"9012-1572981472000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:33:10 GMT
ss-social.js
www.computerworld.com/www/js/webfonts/
4 KB
2 KB
Script
General
Full URL
https://www.computerworld.com/www/js/webfonts/ss-social.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
af34f58ea2fc346a5f7028ad8b721a9bb31405cf283471a37dab53bad10a6a36

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
519893
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 5, 5
content-length
1766
x-via-fastly
Verdad
x-served-by
cache-sjc3126-SJC, cache-sjc3126-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:08 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.719503,VS0,VE0
etag
W/"3950-1572467648000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 05:14:54 GMT
ss-standard.js
www.computerworld.com/www/js/webfonts/
11 KB
4 KB
Script
General
Full URL
https://www.computerworld.com/www/js/webfonts/ss-standard.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
bdfe5b167ff906b96e1f8f028ac8f5e41af7a1892d0cc3a275d28057ba79c0a9

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
520331
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 5, 5
content-length
3898
x-via-fastly
Verdad
x-served-by
cache-sjc3126-SJC, cache-sjc3126-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:08 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.720371,VS0,VE0
etag
W/"10818-1572467648000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 05:07:51 GMT
brandAnalytics.js
www.computerworld.com/www/js/analytics/
2 KB
758 B
Script
General
Full URL
https://www.computerworld.com/www/js/analytics/brandAnalytics.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
9844fb443bd322af1d908116fa890abdbed6b8b6fe73fba91c9beb8408318aad

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
525842
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
3, 3, 5, 5
content-length
461
x-via-fastly
Verdad
x-served-by
cache-sjc3137-SJC, cache-sjc3137-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:04 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.720333,VS0,VE0
etag
W/"2516-1572467644000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 03:35:38 GMT
locales-editions-slug.js
www.computerworld.com/www/js/
2 KB
805 B
Script
General
Full URL
https://www.computerworld.com/www/js/locales-editions-slug.js?v=20191105111835
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
cb46ebb59cbf4a04d2b1a4823cf4ffe7542f616496730377d0ceb5232dc4c385

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
36360
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
2, 2, 5, 5
content-length
569
x-via-fastly
Verdad
x-served-by
cache-sjc3142-SJC, cache-sjc3142-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:17:30 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.720322,VS0,VE0
etag
W/"2186-1572981450000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Tue, 12 Nov 2019 19:33:10 GMT
jquery.lazyload-ad.js
www.computerworld.com/www/js/ads/
10 KB
3 KB
Script
General
Full URL
https://www.computerworld.com/www/js/ads/jquery.lazyload-ad.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
4e6b5fc328bac95eec2e30afa8a58224c9accc6d70daf0e864d75c4c6d07fe94

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
515196
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
1, 1, 5, 5
content-length
3090
x-via-fastly
Verdad
x-served-by
cache-sjc3139-SJC, cache-sjc3139-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:02 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.720300,VS0,VE0
etag
W/"9912-1572467642000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 06:32:55 GMT
liveRamp.js
www.computerworld.com/www/js/utils/
913 B
688 B
Script
General
Full URL
https://www.computerworld.com/www/js/utils/liveRamp.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
7cffadca178c2346f349b255fe288be601a4890e3bde39f23a60d1f33c5386fe

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
522645
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
7, 7, 5, 5
content-length
469
x-via-fastly
Verdad
x-served-by
cache-sjc3130-SJC, cache-sjc3130-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:20 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.720284,VS0,VE0
etag
W/"913-1572467660000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 04:27:57 GMT
gtm.js
www.googletagmanager.com/
145 KB
39 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-WR6LD2P
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
fdfa909978be5df56365aae0ce4f207a3e51d7e89931e823c922be73525895cf
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
br
last-modified
Wed, 06 Nov 2019 06:00:00 GMT
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
39877
x-xss-protection
0
expires
Wed, 06 Nov 2019 07:43:40 GMT
f5b3be27-f789-4ef1-8867-37c67da5b361-web.js
cdn.permutive.com/
530 KB
104 KB
Script
General
Full URL
https://cdn.permutive.com/f5b3be27-f789-4ef1-8867-37c67da5b361-web.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.19.149.54 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
410e2dab86e7ed449683e8d42cb633b2d7ad6f1ea0c6e0dc9bac008de175509b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
cf-cache-status
HIT
age
171
x-guploader-uploadid
AEnB2UogrpoQBSPmUX-pIkbVNwZCwc5o_YO_m-z9LvRASsk17T_XME3FVeryctgZHvHW-nunOoN2rLmyWUijJ09_LrhPtiOK6w
x-goog-storage-class
REGIONAL
status
200
x-goog-metageneration
1
x-goog-stored-content-encoding
gzip
alt-svc
clear
last-modified
Wed, 06 Nov 2019 01:40:40 GMT
server
cloudflare
etag
"8acea4e02ed57f2a4943b81d3185cc3d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-goog-hash
crc32c=ldr1dg==, md5=is6k4C7VfypJQ7gdMYXMPQ==
x-goog-generation
1573004440481700
content-type
application/javascript
cache-control
public, max-age=300
x-goog-stored-content-length
105425
cf-ray
53157017ed8d97ba-FRA
expires
Wed, 06 Nov 2019 07:48:40 GMT
computerworld-fn-logo.svg
alt.idgesg.net/images/furniture/computerworld/
3 KB
3 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/computerworld/computerworld-fn-logo.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
4209120a30a7a319d6507061f8f71225945381d170c4f6b3ffe27eb62f5ce71a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/www.idge.ctw/css/oc-header.css?v=20191105111835
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
r87wEEd68oWg5pMu7uEsBdSEN1WwRACR
via
1.1 varnish, 1.1 varnish
etag
"3353ba5a59fd365823787859ed7cfefe"
age
2951
x-amz-meta-origin-date-iso8601
2019-03-28T14:22:37.000Z
x-cache
HIT, HIT
status
200
content-length
2973
x-amz-id-2
sY/H6WGydWQ5njVfd/PIPXcnoH2TVl8WVveHZ2dfm5EdbotxKVmZBBU2J/2weqDh0JliNmfcFtg=
x-served-by
cache-jfk8142-JFK, cache-fra19164-FRA
last-modified
Thu, 28 Mar 2019 14:46:19 GMT
server
AmazonS3
x-timer
S1573026221.832208,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:40 GMT
x-amz-request-id
57160896AB077BD6
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
2, 1
insider-logo-updated.svg
idge.staticworld.net/images/
3 KB
3 KB
Image
General
Full URL
https://idge.staticworld.net/images/insider-logo-updated.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
90e7f8120f6d2e856e3a487abe2551c75bea54bee192a5a9b8afa4a0216eefa6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/www.idge.ctw/css/oc-header.css?v=20191105111835
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
CqyWtbm.VH6O14ZU_g_VPqkHhNPzIAa5
via
1.1 varnish, 1.1 varnish
etag
"6f2e6c9e8e4cba254e168d6355376522"
age
2453
x-cache
HIT, HIT
status
200
content-length
3102
x-amz-id-2
cU4FqkidAmsgLVYvaKpgehltalsY3aKRzAVXz+jMXF/b6Uy0CYhBR7uFmy/zMyJJtcI+I77JWI4=
x-served-by
cache-jfk8150-JFK, cache-hhn4042-HHN
last-modified
Tue, 27 Mar 2018 00:10:09 GMT
server
AmazonS3
x-timer
S1573026221.874947,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:40 GMT
x-amz-request-id
03EC36E21B64A565
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
2, 1
fa-regular-400.woff2
use.fontawesome.com/releases/v5.6.1/webfonts/
15 KB
15 KB
Font
General
Full URL
https://use.fontawesome.com/releases/v5.6.1/webfonts/fa-regular-400.woff2
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.111.9.35 Phoenix, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
e5c1d9e7bdeaf3372dee724d175d25aca879ed52ae9afd018f503e9d74e09b50

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.fontawesome.com/releases/v5.6.1/css/all.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
last-modified
Wed, 12 Dec 2018 17:44:23 GMT
server
NetDNA-cache/2.2
status
200
etag
"569693c9f5d42d769c7f87b90856219a"
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
access-control-allow-methods
GET
content-type
font/woff2
access-control-allow-origin
*
access-control-max-age
3000
cache-control
max-age=31556926
x-cache
HIT
accept-ranges
bytes
content-length
14868
fa-solid-900.woff2
use.fontawesome.com/releases/v5.6.1/webfonts/
77 KB
78 KB
Font
General
Full URL
https://use.fontawesome.com/releases/v5.6.1/webfonts/fa-solid-900.woff2
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.111.9.35 Phoenix, United States, ASN33438 (HIGHWINDS2 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
08aa3a5ee68a21d5771a70b20495b6da1c0f996c46982cd1b0447ad2db730d11

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.fontawesome.com/releases/v5.6.1/css/all.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
last-modified
Wed, 12 Dec 2018 17:44:35 GMT
server
NetDNA-cache/2.2
status
200
etag
"59ea9019c9b9bc4d83ab9783e830735c"
vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method, Accept-Encoding
access-control-allow-methods
GET
content-type
font/woff2
access-control-allow-origin
*
access-control-max-age
3000
cache-control
max-age=31556926
x-cache
HIT
accept-ranges
bytes
content-length
79072
cse.js
cse.google.com/
11 KB
4 KB
Script
General
Full URL
https://cse.google.com/cse.js?cx=011881588825642368632:cnkmmv0dvim
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
gws /
Resource Hash
15dc55e7162b7c7c919f1b75c4188a11dd1a393ff5276df57edaa9bb35974e2e
Security Headers
Name Value
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
br
server
gws
x-frame-options
SAMEORIGIN
p3p
CP="This is not a P3P policy! See g.co/p3phelp for more info."
status
200
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
text/javascript; charset=UTF-8
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
3489
x-xss-protection
0
expires
Wed, 06 Nov 2019 07:43:40 GMT
logic
sourcepoint.mgr.consensu.org/consent/v2/3919/
1 KB
2 KB
XHR
General
Full URL
https://sourcepoint.mgr.consensu.org/consent/v2/3919/logic?withSiteActions=true&consentUUID=[CONSENT_UUID]&euconsent=[EUCONSENT]&mmsDomain=cmp.computerworld.com&hasConsentData&consentedToAny&consentedToAll&shortCircuitDetection&requestUUID=e799953a-939c-42bd-a71f-ea17a34e781b-1573026220650
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/messaging.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.123.110.218 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-3-123-110-218.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
8e757ef2da629923da0b09343ffd137f22e8af06a71377a04d9573a13df0435a

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
status
200
access-control-allow-methods
GET, PUT, POST, DELETE
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache
access-control-allow-credentials
true
access-control-allow-headers
Origin, X-Requested-With, Content-Type, Accept, Authorization
content-length
1405
hamburger-v2.svg
alt.idgesg.net/images/furniture/
610 B
893 B
Image
General
Full URL
https://alt.idgesg.net/images/furniture/hamburger-v2.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
413215e01c47f149df91c6d2281bc5288980420466333b3190d2807c1a5a6966

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/www/css/oc-header.css?v=20191105111835
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
1fnsULWZsCA3r7yvlAPj1P80IHmK7W6x
via
1.1 varnish, 1.1 varnish
etag
"cf32478c18a5e4e5ee7de7180fb12c18"
age
1670
x-amz-meta-origin-date-iso8601
2018-12-17T19:19:51.000Z
x-cache
HIT, HIT
status
200
content-length
610
x-amz-id-2
VxObjjqYAkw9cZLe7aNK2UrvskxTCnL7floNQHsvqAaSYA9SUKXZjD6WS0vqmFOSwohZdmZNxbk=
x-served-by
cache-jfk8138-JFK, cache-fra19164-FRA
last-modified
Mon, 17 Dec 2018 19:20:57 GMT
server
AmazonS3
x-timer
S1573026221.832270,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:40 GMT
x-amz-request-id
07A704D53728BB87
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
4, 1
computerworld-mm-bkg.jpg
alt.idgesg.net/images/furniture/computerworld/
102 KB
102 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/computerworld/computerworld-mm-bkg.jpg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
ea5fe8b85e681bf6d538f25020ff0a5b009347afc6d559428ab106cc4424b9c1

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/www.idge.ctw/css/oc-header.css?v=20191105111835
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
DJgh8YdxuMHi7AK3jXJqy7QHT8eOGscF
via
1.1 varnish, 1.1 varnish
etag
"159036f40a49885cfe4bffa06d820857"
age
268800
x-amz-meta-origin-date-iso8601
2019-03-28T14:09:09.000Z
x-cache
HIT, HIT
status
200
content-length
104478
x-amz-id-2
xW7Rhwka8gTVpTr1udcaCypt82/OI64jzBH70CUhhWUdxYwymFwRsFOOK4cZxtuLEzsEHXFEudU=
x-served-by
cache-jfk8142-JFK, cache-fra19164-FRA
last-modified
Thu, 28 Mar 2019 14:24:18 GMT
server
AmazonS3
x-timer
S1573026221.832279,VS0,VS0,VE1
date
Wed, 06 Nov 2019 07:43:40 GMT
x-amz-request-id
48FC2A22794F50C2
cache-control
public, max-age=2592000
accept-ranges
bytes
content-type
image/jpeg
x-cache-hits
1, 1
megamenu-ip-logo.svg
alt.idgesg.net/images/furniture/insiderpro/megamenu/
5 KB
5 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/insiderpro/megamenu/megamenu-ip-logo.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
cc8104c2421ddba0fee8e079eb7f771f4c14ec71c0c714d67c530afcbf761766

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/www/css/oc-header.css?v=20191105111835
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
kNgQwgxS9UBWR4a1aGMjvH18qrlDRyAS
via
1.1 varnish, 1.1 varnish
etag
"7bea921263c2f7aa1454205785963338"
age
5084
x-amz-meta-origin-date-iso8601
2019-06-26T10:33:19.159Z
x-cache
HIT, HIT
status
200
content-length
4898
x-amz-id-2
lHG39bXy8iGf5PoWqobiLP2oQnaWpITGMEcStIZ3wKcAf1R/NnxxC/IA4mVtBgF7o1zkfuOTZqE=
x-served-by
cache-jfk8132-JFK, cache-fra19164-FRA
last-modified
Wed, 26 Jun 2019 10:33:59 GMT
server
AmazonS3
x-timer
S1573026221.832376,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:40 GMT
x-amz-request-id
A91524165F2F57E8
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
6, 1
l
use.typekit.net/af/cafa63/00000000000000000001709a/27/
45 KB
45 KB
Font
General
Full URL
https://use.typekit.net/af/cafa63/00000000000000000001709a/27/l?primer=fff1a989570eb474b8c22c57cc7199e63bfc7e911b750165d0199218f0b7e7cc&fvd=n4&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
d68114d793040cf8dbfe03d8efed8eea73785e53e6878fa2f6e0899842f912b7

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
server
nginx
etag
"dca08fa48313f64edf1cb207c7e9765f05f80f6d"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
45940
ss-standard.woff
www.computerworld.com/www.idge/css/webfonts/
26 KB
27 KB
Font
General
Full URL
https://www.computerworld.com/www.idge/css/webfonts/ss-standard.woff
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
d2aae940b6d023c99cbd656bbd0868f51bcf4a93455efef42cc95d8a4c7bceca

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/www.idge/css/webfonts/ss-standard.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
5189
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
27058
x-via-fastly
Verdad
x-served-by
cache-sjc3121-SJC, cache-sjc3121-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:14:36 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.742944,VS0,VE0
etag
W/"27096-1572981276000-gzip"
vary
Accept-Encoding,Cookie
content-type
font/woff
via
1.1 varnish, 1.1 varnish
x-vcl-version
92
accept-ranges
bytes
x-cache-hits
1, 1, 2, 2
l
use.typekit.net/af/1b1b1e/00000000000000000001709e/27/
45 KB
45 KB
Font
General
Full URL
https://use.typekit.net/af/1b1b1e/00000000000000000001709e/27/l?primer=fff1a989570eb474b8c22c57cc7199e63bfc7e911b750165d0199218f0b7e7cc&fvd=n7&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
a143438dc0b9ddc61bc901440e0b90cd0d39b09a9129443ee68acadc7cf85ead

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
server
nginx
etag
"3ebf20ca2634841fd6a3314769e4f1e3097888a0"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
45740
ss-social-circle.woff
www.computerworld.com/www.idge/css/webfonts/
10 KB
10 KB
Font
General
Full URL
https://www.computerworld.com/www.idge/css/webfonts/ss-social-circle.woff
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
8982bee74ee4a24031eea6ffe2cf2a3a41b3eee01490dfb4b8a641ef69dc923f

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/www.idge/css/webfonts/ss-social.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
5939
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
9716
x-via-fastly
Verdad
x-served-by
cache-sjc3142-SJC, cache-sjc3142-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 19:14:36 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.742928,VS0,VE0
etag
W/"9732-1572981276000-gzip"
vary
Accept-Encoding,Cookie
content-type
font/woff
via
1.1 varnish, 1.1 varnish
x-vcl-version
92
accept-ranges
bytes
x-cache-hits
4, 4, 2, 2
abzPEpART5tPDpJNEg-STo0P0hyS3BkWTY4OERKQ0k0PjlwZGdpWTY3RXA7NkFIOllHOjs6R0c6R3BZSDpISD5EQzRHOjs6R0c6R3BZSDpISD5EQzRCOkhINjw6NDhESkNJcGNZP0twZWFjYWRka2tZODk4cEw-QzlETGE0SEU0YUJIPGE0PkNJOkdDNkFhODk4ZF...
cmp.computerworld.com/
17 KB
18 KB
Script
General
Full URL
https://cmp.computerworld.com/abzPEpART5tPDpJNEg-STo0P0hyS3BkWTY4OERKQ0k0PjlwZGdpWTY3RXA7NkFIOllHOjs6R0c6R3BZSDpISD5EQzRHOjs6R0c6R3BZSDpISD5EQzRCOkhINjw6NDhESkNJcGNZP0twZWFjYWRka2tZODk4cEw-QzlETGE0SEU0YUJIPGE0PkNJOkdDNkFhODk4ZFk9Rzo7cD1JSUVIWGZ0WGV5WGV5TExMYThEQkVKSTpHTERHQTlhOERCWGV5NkdJPjhBOlhleWZnaGRsaGlYZXlMPU5gPkM5PjZIYDk2STZgRUdESTo4ST5EQ2BBNkxgQzo6OUhgSURgNktEPjlgST06YEU6Rzs6OEk-RENgQURERT1EQTphPUlCQVhmeUpJQjRIREpHODpYZnd0OTpISUc2WGVpSklCNEI6OT5KQlhmdzpCNj5BWGVpSklCNDhEQ0k6Q0lYZnd8QjY8OlhlaGZ0WGVoZWMsPU5YZWhlY3xDOT42WGVoeGVYZWhrY1hlaGxsSFhlaGVjOTZJNlhlaGVjRUdESTo4ST5EQ1hlaGVjQTZMWGVoZWNDOjo5SFhlaGVjSURYZWhlYzZLRD45WGVoZWNJPTpYZWhlY0U6Rzs6OEk-RENYZWhlY0FEREU9REE6WGVpSklCNDg2QkU2PjxDWGZ3KT06WGVoZWN3Nj5BTlhlaGVjdU5JOlhlaUpJQjRJOkdCWGZ3KT06WGVoZWN3Nj5BTlhlaGVjdU5JOlhlaUpJQjQ5Nkk6WGZ3ZWNkbGRkY2ljaWhpZWVZOERDSDpDSSoqfHdwOmRpZ2trN2lgaWc5N2BnOWxoYGtjZWhgOjg6ZWs7amprbGw4WUc6Rko6SEkqKnx3cDpqbGxsaGY2YGxmbDhgZ2U3OWA2amQ7YDo2ZGo2Zmc6amtkN2BkaGpmY2VpZWVjaWhjWThEREA-OnBYaHVYZWU0SEU0OkM2N0E6NDk7RTRFOkdIREM2QT5POjk0NjlIWGZ3OzZBSDpYZnVYZWVYaHdZQUQ2OTo5dzZJNnBYaHVYanVYZWU-OVhlZVhmdFhlZXYkIyh4IylYZnQ6QzlFRD5DSVhmdD1JSUVIWGZ0WGV5WGV5SERKRzg6RUQ-Q0lhQjxHYThEQ0g6Q0hKYURHPFhmdGZsZGxYZWVYZXZYZWVHOkhKQUlYZWVYZnRYZWVYanVYaHZYZWU9Nkh2RENIOkNJdzZJNlhodlhlZVhmdDs2QUg6WGV2WGh2WGVlOERDSDpDSTo5KUR0Q05YaHZYZWVYZnRDSkFBWGV2WGh2WGVlOERDSDpDSTo5KUR0QUFYaHZYZWVYZnRDSkFBWGV2WGh2WGVlSD1ER0l2Pkc4Sj5JdzpJOjhJPkRDWGh2WGVlWGZ0OzZBSDpYandYZWVYandYaHc=
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/messaging.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
18.194.227.247 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-18-194-227-247.eu-central-1.compute.amazonaws.com
Software
Jetty(9.4.2.v20170220) /
Resource Hash
2e88314e5a9813e027e3061ffceac1ca21ff17837f28cf7a034fcd159b528cc8

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 07:43:40 GMT
x-sp-mms-node
mms-auu.node.fra.consul
server
Jetty(9.4.2.v20170220)
access-control-allow-methods
GET
content-type
application/javascript
status
200
cache-control
no-store, no-cache, private
access-control-allow-credentials
true
x-sp-mms-env
1
expires
Sat, 15 Nov 2008 16:00:00 GMT
t
jadserve.postrelease.com/
28 KB
4 KB
Script
General
Full URL
https://jadserve.postrelease.com/t?ntv_url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&ntv_mvi
Requested by
Host: s.ntv.io
URL: https://s.ntv.io/serve/load.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.153.215.15 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-153-215-15.compute-1.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
5a69db32ae4ba41efc39ac338cad2d80f4bc04a436274720c84ed3a5d7b30056

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
server
nginx/1.12.1
status
200
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
text/javascript;charset=UTF-8
content-length
3372
expires
Mon, 1 Jan 1990 12:00:00 GMT
l
use.typekit.net/af/c63dde/0000000000000000000170a8/27/
17 KB
17 KB
Font
General
Full URL
https://use.typekit.net/af/c63dde/0000000000000000000170a8/27/l?primer=7fa3915bdafdf03041871920a205bef951d72bf64dd4c4460fb992e3ecc3a862&fvd=n7&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
79bfd94ffb887bea6339173839d658d3871e15846c317ca2a5d092615fa85f09

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
server
nginx
etag
"c8055f06a1c5ad6765f4692c80f455f34fc24e0a"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
17340
integrator.js
adservice.google.de/adsid/
109 B
717 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=www.computerworld.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
122 B
732 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.computerworld.com
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
4d19e3c9f0d1eab8415cfa325a33cb94d7274c69f84e4610c70f3c292186fef7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
119
x-xss-protection
0
pubads_impl_2019103101.js
securepubads.g.doubleclick.net/gpt/
159 KB
58 KB
Script
General
Full URL
https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019103101.js
Requested by
Host: securepubads.g.doubleclick.net
URL: https://securepubads.g.doubleclick.net/tag/js/gpt.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.16.130 , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra15s46-in-f2.1e100.net
Software
sffe /
Resource Hash
e4ab34b8a905b1076f36fddd2dc1e2dacd9c1bbca6614ab260e9b40aa0dced41
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 31 Oct 2019 13:10:21 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, immutable, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
59272
x-xss-protection
0
expires
Wed, 06 Nov 2019 07:43:40 GMT
54d7e08c-9819-4d48-b5dd-1b76cbee5aff
https://www.computerworld.com/
3 KB
0
Other
General
Full URL
blob:https://www.computerworld.com/54d7e08c-9819-4d48-b5dd-1b76cbee5aff
Requested by
Host: cdn.permutive.com
URL: https://cdn.permutive.com/f5b3be27-f789-4ef1-8867-37c67da5b361-web.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
33240dafa889a235e51d923c736a077200b4a402ad6d44ab2653e35688f5c8ae

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Length
3267
Content-Type
application/javascript
cse_element__en.js
www.google.com/cse/static/element/b5752d27691147d6/
256 KB
85 KB
Script
General
Full URL
https://www.google.com/cse/static/element/b5752d27691147d6/cse_element__en.js?usqp=CAI%3D
Requested by
Host: cse.google.com
URL: https://cse.google.com/cse.js?cx=011881588825642368632:cnkmmv0dvim
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
f50798458e958d44022e68ed50eaf58ee47256a163f3022681fe1c899139d612
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 04:39:48 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 20 Sep 2019 16:22:21 GMT
server
sffe
age
11032
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
86564
x-xss-protection
0
expires
Thu, 05 Nov 2020 04:39:48 GMT
default+en.css
www.google.com/cse/static/element/b5752d27691147d6/
40 KB
9 KB
Stylesheet
General
Full URL
https://www.google.com/cse/static/element/b5752d27691147d6/default+en.css
Requested by
Host: cse.google.com
URL: https://cse.google.com/cse.js?cx=011881588825642368632:cnkmmv0dvim
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
40a20291f9b526cba58796a4bbd0256d5663313e02c9d5ab5a842476562b3108
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 04:39:48 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 20 Sep 2019 16:22:21 GMT
server
sffe
age
11032
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
9042
x-xss-protection
0
expires
Thu, 05 Nov 2020 04:39:48 GMT
default.css
www.google.com/cse/static/style/look/v3/
12 KB
3 KB
Stylesheet
General
Full URL
https://www.google.com/cse/static/style/look/v3/default.css
Requested by
Host: cse.google.com
URL: https://cse.google.com/cse.js?cx=011881588825642368632:cnkmmv0dvim
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
8c5519ff6e93dfefc21c8b9c586ceef2060b2161e6be946d5b704341456ef053
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:05:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 07 May 2019 14:00:00 GMT
server
sffe
age
2319
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=3000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
2805
x-xss-protection
0
expires
Wed, 06 Nov 2019 07:55:01 GMT
gtm.js
www.googletagmanager.com/
120 KB
34 KB
Script
General
Full URL
https://www.googletagmanager.com/gtm.js?id=GTM-WBVXW9&l=dataLayer
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WR6LD2P
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
2b100bc0267485a7758fb2431d47b8542bb2154187f03a30a487d8311edfabaa
Security Headers
Name Value
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
br
last-modified
Wed, 06 Nov 2019 06:00:00 GMT
server
Google Tag Manager
access-control-allow-headers
Cache-Control
status
200
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
http://www.googletagmanager.com
cache-control
private, max-age=900
access-control-allow-credentials
true
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
34846
x-xss-protection
0
expires
Wed, 06 Nov 2019 07:43:40 GMT
api.js
w.soundcloud.com/player/
5 KB
3 KB
Script
General
Full URL
https://w.soundcloud.com/player/api.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WR6LD2P
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.85.183.120 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-85-183-120.fra50.r.cloudfront.net
Software
am/2 /
Resource Hash
78d83d68ccf7a24aca085486bfc291760424279b6f5308092af4fe600b9d1e19
Security Headers
Name Value
Strict-Transport-Security max-age=2592000

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:40:49 GMT
Via
sssr, 1.1 f96185b1d69d6f85635bc2b5554da639.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA50
Transfer-Encoding
chunked
X-Cache
Hit from cloudfront
P3P
policyref="https://w.soundcloud.com/player/w3c/p3p.xml", CP="NON DSP COR CUR ADM DEV TAI PSAo PSDo OUR STP CNT"
Connection
keep-alive
Content-Encoding
gzip
Last-Modified
Wed, 30 Oct 2019 12:47:54 GMT
Server
am/2
ETag
W/"1298-3484513282"
Strict-Transport-Security
max-age=2592000
Content-Type
application/javascript
Cache-Control
public, max-age=300
Accept-Ranges
bytes
X-Amz-Cf-Id
pzi6QRmrraD1DBznog2P6YYHui69yPY9fHIRYwnyB7kIyds5RXLomA==
l
use.typekit.net/af/a28b50/00000000000000000000e803/27/
14 KB
14 KB
Font
General
Full URL
https://use.typekit.net/af/a28b50/00000000000000000000e803/27/l?primer=7fa3915bdafdf03041871920a205bef951d72bf64dd4c4460fb992e3ecc3a862&fvd=n5&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/messaging.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
3c84f7dd73aac7155657f8c2a339eec0c00086be3bce750eb44957b909e2f8c9

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
server
nginx
etag
"08a387c1b34867ee4ed26dfa892c9f802a1b7ae3"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
14300
why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html
www.computerworld.com/article/3451956/
Redirect Chain
  • https://www.computerworld.com/article/3451956/
  • https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html
64 KB
64 KB
Image
General
Full URL
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
age
7646
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
38651
x-via-fastly
Verdad
x-served-by
cache-sjc3129-SJC, cache-sjc3129-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
server
Apache-Coyote/1.1
x-timer
S1573026221.005103,VS0,VE1
vary
Accept-Encoding,Cookie
content-type
text/html;charset=UTF-8
via
1.1 varnish, 1.1 varnish
x-vcl-version
92
accept-ranges
bytes
x-cache-hits
1, 1, 1, 1

Redirect headers

date
Wed, 06 Nov 2019 07:43:40 GMT
content-encoding
gzip
age
7646
x-cache
MISS, MISS, HIT, HIT
status
301
content-length
25
x-via-fastly
Verdad
x-served-by
cache-sjc3136-SJC, cache-sjc3136-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
server
Apache-Coyote/1.1
x-timer
S1573026221.956239,VS0,VE0
location
/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html
vary
Accept-Encoding,Cookie
via
1.1 varnish, 1.1 varnish
x-vcl-version
92
accept-ranges
bytes
x-cache-hits
0, 0, 1, 1
5ba5e406e33cb603e01b1be0_close-icon.svg
uploads-ssl.webflow.com/57d30b6aa1924bb30d7ae290/
2 KB
1 KB
Image
General
Full URL
https://uploads-ssl.webflow.com/57d30b6aa1924bb30d7ae290/5ba5e406e33cb603e01b1be0_close-icon.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/messaging.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.225.78.11 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-13-225-78-11.fra2.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
2ab172d1a6dab39d0b8efd61404468129ea0c23eaee414669b69276064dd3c11

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Fri, 12 Jul 2019 20:30:46 GMT
content-encoding
gzip
last-modified
Sat, 22 Sep 2018 06:41:11 GMT
server
AmazonS3
age
10062775
vary
Accept-Encoding
x-cache
Hit from cloudfront
x-amz-version-id
YCr6y.ejPXZjFF6Y_IHXAbhJqsw3Y8no
status
200
cache-control
max-age=31536000, must-revalidate
x-amz-cf-pop
FRA2-C2
content-type
image/svg+xml
x-amz-cf-id
iygcnKpoCYpc_3EHEG7dMbOB9VDK90LTloblDKkWnLGv-0Vhpv5f2w==
via
1.1 e1e056e45a0f8d6bc22b223900511170.cloudfront.net (CloudFront)
computerworld-black-100800410-orig.jpg
images.idgesg.net/images/article/2019/06/
13 KB
14 KB
Image
General
Full URL
https://images.idgesg.net/images/article/2019/06/computerworld-black-100800410-orig.jpg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
9166c84f283f1438e86f3f6a8b200fc476c9f7eb02ffb653941c72a958b65ce7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
C1DljYcgmNZwTIaMO2.8uJKaK5jGSoi0
via
1.1 varnish, 1.1 varnish
etag
"88ea1a1fc7629b7df8d03ad92f051307"
age
128073
x-cache
HIT, HIT
status
200
content-length
13593
x-amz-id-2
iR7pBDwkbO+P5f7GzvatRFfP9yE1gUjPCBGVqZvuLpabtEE5PCC0dLXw7ggrZ76AkQMz54FCe08=
x-served-by
cache-jfk8140-JFK, cache-hhn4042-HHN
last-modified
Wed, 26 Jun 2019 19:20:26 GMT
server
AmazonS3
x-timer
S1573026221.118274,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:41 GMT
x-amz-request-id
0BC6E7B5290D1506
cache-control
public, max-age=2592000
accept-ranges
bytes
content-type
image/jpeg
x-cache-hits
1, 2
l
use.typekit.net/af/9cf49e/00000000000000000000e807/27/
14 KB
14 KB
Font
General
Full URL
https://use.typekit.net/af/9cf49e/00000000000000000000e807/27/l?primer=7fa3915bdafdf03041871920a205bef951d72bf64dd4c4460fb992e3ecc3a862&fvd=n9&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
a4b7036faf76b31b0d0b07feee947f5fe32862bfbd7eaaf3a9a1d6b407473e36

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
server
nginx
etag
"5d1fa2ea6ee080393fd984e89c201f5030ee920e"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
14196
l
use.typekit.net/af/c2d3de/00000000000000000000e804/27/
14 KB
15 KB
Font
General
Full URL
https://use.typekit.net/af/c2d3de/00000000000000000000e804/27/l?primer=7fa3915bdafdf03041871920a205bef951d72bf64dd4c4460fb992e3ecc3a862&fvd=i5&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
5939294f7d1b8f9bd2173f4142059bcce68132be8c1dfdf20f58915ae70dfc90

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
server
nginx
etag
"a8d9d2919b68b19824491cd15a30bea46b0aa79d"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
14760
l
use.typekit.net/af/d32e26/00000000000000000001709b/27/
46 KB
46 KB
Font
General
Full URL
https://use.typekit.net/af/d32e26/00000000000000000001709b/27/l?primer=fff1a989570eb474b8c22c57cc7199e63bfc7e911b750165d0199218f0b7e7cc&fvd=i4&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
ce8e1e18384d0b92e0ac0aa8dbad77fd115a1fb1d335e4f92f19db3c27ca7ec0

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:40 GMT
server
nginx
etag
"170b86fe9770e5f0e798d2af7d0d386e5de068e6"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
47040
pub
pixel.adsafeprotected.com/services/
910 B
1 KB
XHR
General
Full URL
https://pixel.adsafeprotected.com/services/pub?anId=8879&slot=%7Bid:gpt-skin,ss:%5B1.1%5D,p:/8456/IDG.G_B2B_Computerworld.com/security_section,t:display%7D&slot=%7Bid:inread,ss:%5B1.1,2.1%5D,p:/8456/IDG.G_B2B_Computerworld.com/security_section,t:display%7D&slot=%7Bid:gpt-overlay,ss:%5B640.480%5D,p:/8456/IDG.G_B2B_Computerworld.com/security_section,t:display%7D&slot=%7Bid:topleaderboard,ss:%5B970.90,970.250,728.90%5D,p:/8456/IDG.G_B2B_Computerworld.com/security_section,t:display%7D&slot=%7Bid:topimu,ss:%5B300.600,300.250,120.600,160.600%5D,p:/8456/IDG.G_B2B_Computerworld.com/security_section,t:display%7D&slot=%7Bid:oc_ad_1,ss:%5B7.7%5D,p:/8456/IDG.G_B2B_Computerworld.com/security_section,t:display%7D&wr=1600.1200&sr=1600.1200&sessionId=23e42ef1-7065-0246-3faf-62626b85ab90&url=https%253A%252F%252Fwww.computerworld.com%252Farticle%252F3451956%252Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%253Futm_source%253DAdestra%2526utm_medium%253Demail%2526utm_content%253DImage%25253A%252520Why%252520India%2525E2%252580%252599s%252520data%252520protection%252520law%252520needs%252520to%252520avoid%252520the%252520perfection%252520loophole%2526utm_campaign%253DThe%252520Daily%252520Byte%2526utm_term%253DThe%252520Daily%252520Byte%2526utm_date%253D20191106065622
Requested by
Host: cdn.adsafeprotected.com
URL: https://cdn.adsafeprotected.com/iasPET.1.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
199.166.0.26 , United States, ASN7415 (ADSAFE-1 - Integral Ad Science, Inc., US),
Reverse DNS
anycast.pixel.adsafeprotected.com
Software
nginx /
Resource Hash
1d595a0fd08e4c61bac33453abd064752b828b9fcdf15e117000dc0e83f1916a

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:41 GMT
X-Server-Name
app21ami.ami.303net.pvt
Transfer-Encoding
chunked
Content-Type
application/json;charset=UTF-8
Access-Control-Allow-Origin
https://www.computerworld.com
Access-Control-Expose-Headers
X-Server-Name
Access-Control-Allow-Credentials
true
Connection
keep-alive
Timing-Allow-Origin
*
Server
nginx
bg-topstories.png
idge.staticworld.net/ctw/
2 KB
2 KB
Image
General
Full URL
https://idge.staticworld.net/ctw/bg-topstories.png
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
05a563039fb544dcfbb030ab912b69d02e57590f95d950c22b1544d4d94aa1be

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/www.idge.ctw/css/article.css?v=20191105111835
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
DH_jNIo83ZoLGDTO0qaKogYARCQPQxoP
via
1.1 varnish, 1.1 varnish
etag
"0f923f2a6910f2e31c9217a18a5c5e34"
age
1152385
x-cache
HIT, HIT
status
200
content-length
2265
x-amz-id-2
jM1PTihCklP8FdcnjCvR79NsdHJQyDG8OK869PZlT47BV/TgDE/FvRce+E7qnfYJw+hK7bTJk6A=
x-served-by
cache-jfk8122-JFK, cache-hhn4042-HHN
last-modified
Tue, 27 Mar 2018 00:09:10 GMT
server
AmazonS3
x-timer
S1573026221.019915,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:41 GMT
x-amz-request-id
F7F50583E934892D
cache-control
public, max-age=2592000
accept-ranges
bytes
content-type
image/png
x-cache-hits
1, 4
outbrain.js
widgets.outbrain.com/
107 KB
37 KB
Script
General
Full URL
https://widgets.outbrain.com/outbrain.js?_=1573026220578
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.69.225 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-69-225.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
c51502424feb25b180397c31bc508446432626d2d73e1f26e16ef6d1cb057a79

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:41 GMT
Content-Encoding
gzip
Connection
keep-alive
ETag
W/"1ad3c-QChUxzE0KWUP3J29HswjUwy4OJI"
Vary
Accept-Encoding
Edge-Cache-Tag
widget-cheetah
Content-Type
application/x-javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=14400
Access-Control-Allow-Credentials
false
Access-Control-Allow-Methods
GET,POST
Timing-Allow-Origin
*
Content-Length
37427
pub.531979.min.js
www.dwin2.com/
215 KB
80 KB
Script
General
Full URL
https://www.dwin2.com/pub.531979.min.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WBVXW9&l=dataLayer
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.110 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
8ec68006e61bdb9b3e39c7aa39da4c6964dbfd06be4fcc5be28e7981eb20353d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
age
3499
x-cache
HIT, HIT
status
200
x-cache-hits
7, 8
content-length
81755
x-served-by
cache-lcy19242-LCY, cache-hhn4083-HHN
last-modified
Tue, 05 Nov 2019 22:22:34 GMT
server
nginx
x-timer
S1573026221.045077,VS0,VE0
etag
"5dc1f62a-35d92"
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=3600
accept-ranges
bytes
expires
Wed, 06 Nov 2019 07:45:22 GMT
computerworld_logo-final.svg
idge.staticworld.net/ctw/
3 KB
4 KB
Image
General
Full URL
https://idge.staticworld.net/ctw/computerworld_logo-final.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
aabfa6620524db406cff6f8d40382ab112770a3dc7494435ee177c89c348f3ce

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/www.idge.ctw/css/foot.css?v=20191105111835
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
EtzZQ7cT2kqC_LGpeC1y.BPw9rdJBYgO
via
1.1 varnish, 1.1 varnish
etag
"c5911f9888bb0247426b88e12714ded0"
age
4603
x-cache
HIT, HIT
status
200
content-length
3536
x-amz-id-2
kgE7+n/GDXJ8U+zAAoxvtoN9A28VxKkSa1YyZikjIKJORG3dZSBHRgXYG/VdKXODr8w68bS0EuY=
x-served-by
cache-jfk8130-JFK, cache-hhn4042-HHN
last-modified
Tue, 27 Mar 2018 00:09:11 GMT
server
AmazonS3
x-timer
S1573026221.039014,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:41 GMT
x-amz-request-id
13C38A508876C13E
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
3, 4
17af3e0389d4bd4dd313d09c98f1136b
idg.blueconic.net/plugin/plugin/
96 KB
24 KB
Script
General
Full URL
https://idg.blueconic.net/plugin/plugin/17af3e0389d4bd4dd313d09c98f1136b
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.81.224.214 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-81-224-214.compute-1.amazonaws.com
Software
- /
Resource Hash
8e369f667a6fb482f534daa45bc449e8a2a27a19ddddff61fbcbdb62e0bb69cd
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
-
etag
17af3e0389d4bd4dd313d09c98f1136b
x-robots-tag
noindex, nofollow
p3p
policyref="", CP="DSP"
status
200
x-permitted-cross-domain-policies
master-only
cache-control
private, max-age=31536000
content-type
text/javascript; charset=utf-8
content-length
24021
x-xss-protection
1; mode=block
expires
Thu, 05 Nov 2020 07:43:41 GMT
l
use.typekit.net/af/f72c04/0000000000000000000170a4/27/
17 KB
17 KB
Font
General
Full URL
https://use.typekit.net/af/f72c04/0000000000000000000170a4/27/l?primer=7fa3915bdafdf03041871920a205bef951d72bf64dd4c4460fb992e3ecc3a862&fvd=n4&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
234ef0c4a4fa49aab610ad8ed65780f697fff23ae133f3d3be53a89852bb804d

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
server
nginx
etag
"7519e81365bf63f5192f0c9b87ad82ce943ffc0c"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
17692
init.js
www.dwin2.com/
207 B
350 B
Script
General
Full URL
https://www.dwin2.com/init.js?t=1573026221079
Requested by
Host: www.dwin2.com
URL: https://www.dwin2.com/pub.531979.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.110 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
nginx /
Resource Hash
80f704b79cf24198800e41c953686959a85a0030f3fe7e6eee0669d30a3ca47c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
age
2761
x-cache
HIT, HIT
status
200
x-cache-hits
11, 200
content-length
187
x-served-by
cache-lcy19225-LCY, cache-hhn4083-HHN
last-modified
Tue, 29 Oct 2019 09:36:05 GMT
server
nginx
x-timer
S1573026221.083791,VS0,VE0
etag
"5db80805-cf"
vary
Accept-Encoding
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=3600
accept-ranges
bytes
expires
Wed, 06 Nov 2019 06:18:24 GMT
tso
www.computerworld.com/ads/
3 KB
1 KB
XHR
General
Full URL
https://www.computerworld.com/ads/tso?localeId=0
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
0fe34e87429f26b64f5b060e82d98f0e98940f29f89887a898a0c0f22c06d672

Request headers

Accept
application/json, text/javascript, */*; q=0.01
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
vary
Accept-Encoding,Cookie
age
24144
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
1041
x-via-fastly
Verdad
x-served-by
cache-sjc3151-SJC, cache-sjc3151-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
server
Apache-Coyote/1.1
x-timer
S1573026221.098640,VS0,VE0
x-fastly-ttl
14400.000
content-type
application/json;charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
max-age=14400
x-vcl-version
92
accept-ranges
bytes
x-fastly-stale
432000.000
x-cache-hits
122, 122, 4, 4
beacon.js
sb.scorecardresearch.com/
1 KB
1 KB
Script
General
Full URL
https://sb.scorecardresearch.com/beacon.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
76c393f564f53c19e795307e622edc8657a603f7a816c2646385697286d11313

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:41 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
private, no-transform, max-age=86400
Connection
keep-alive
Content-Length
902
Expires
Thu, 07 Nov 2019 07:43:41 GMT
tile
www.computerworld.com/napi/
993 B
456 B
XHR
General
Full URL
https://www.computerworld.com/napi/tile?def=blox4.dynamic&geo=0&definition=nav.fixed&placement=Nav+Fixed
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
5c66544d9432198f8c71a5a900c3ea6e8c353e5a2075040d9a7fc4f2ad3d1a34

Request headers

Accept
text/html, */*; q=0.01
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
vary
Accept-Encoding,Cookie
age
2288
x-cache
HIT, HIT, MISS, MISS
status
200
content-length
327
x-via-fastly
Verdad
x-served-by
cache-sjc3148-SJC, cache-sjc3148-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
server
Apache-Coyote/1.1
x-timer
S1573026221.106275,VS0,VE150
x-fastly-ttl
14400.000
content-type
text/html;charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
max-age=14400
x-vcl-version
92
accept-ranges
bytes, bytes
x-fastly-stale
432000.000
x-cache-hits
31, 31, 0, 0
tile
www.computerworld.com/napi/
2 KB
837 B
XHR
General
Full URL
https://www.computerworld.com/napi/tile?def=blox4.dynamic&geo=0&placement=Nav+Mega+Column+1
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
9377baf5154b69c1582f23a968229039e2f1be17e28e65d0b247a6c337cf755e

Request headers

Accept
text/html, */*; q=0.01
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
vary
Accept-Encoding,Cookie
age
2559
x-cache
HIT, HIT, MISS, MISS
status
200
content-length
531
x-via-fastly
Verdad
x-served-by
cache-sjc3144-SJC, cache-sjc3144-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
server
Apache-Coyote/1.1
x-timer
S1573026221.107151,VS0,VE145
x-fastly-ttl
14400.000
content-type
text/html;charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
max-age=14400
x-vcl-version
92
accept-ranges
bytes, bytes
x-fastly-stale
432000.000
x-cache-hits
31, 31, 0, 0
tile
www.computerworld.com/napi/
2 KB
656 B
XHR
General
Full URL
https://www.computerworld.com/napi/tile?def=blox4.dynamic&geo=0&placement=Nav+Mega+Column+2
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
90e0666da610154ef69cfbc9943e67d390adecb3cfe2ddbf9be8b1c250dc06a8

Request headers

Accept
text/html, */*; q=0.01
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
vary
Accept-Encoding,Cookie
age
16903
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
498
x-via-fastly
Verdad
x-served-by
cache-sjc3120-SJC, cache-sjc3120-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
server
Apache-Coyote/1.1
x-timer
S1573026221.108026,VS0,VE0
x-fastly-ttl
14400.000
content-type
text/html;charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
max-age=14400
x-vcl-version
92
accept-ranges
bytes
x-fastly-stale
432000.000
x-cache-hits
55, 55, 5, 5
tile
www.computerworld.com/napi/
240 B
226 B
XHR
General
Full URL
https://www.computerworld.com/napi/tile?def=blox4.dynamic&geo=0&placement=Nav+Mega+Column+3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
80bc122106fbc20338532a342b11cd70c8ab2809b6db25abe91c63179a949e31

Request headers

Accept
text/html, */*; q=0.01
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
vary
Accept-Encoding,Cookie
age
16849
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
88
x-via-fastly
Verdad
x-served-by
cache-sjc3139-SJC, cache-sjc3139-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
server
Apache-Coyote/1.1
x-timer
S1573026221.111272,VS0,VE0
x-fastly-ttl
14400.000
content-type
text/html;charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
max-age=14400
x-vcl-version
92
accept-ranges
bytes
x-fastly-stale
432000.000
x-cache-hits
49, 49, 5, 5
tile
www.computerworld.com/napi/
6 KB
1 KB
XHR
General
Full URL
https://www.computerworld.com/napi/tile?def=blox4.dynamic&geo=0&placement=Nav+Mega+Column+4
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
f7a2f590dcecf23cc799a4d24e6010c5bb0e9708ab2368a57578a257887ef950

Request headers

Accept
text/html, */*; q=0.01
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
vary
Accept-Encoding,Cookie
age
16762
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
1180
x-via-fastly
Verdad
x-served-by
cache-sjc3120-SJC, cache-sjc3120-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
server
Apache-Coyote/1.1
x-timer
S1573026221.112256,VS0,VE0
x-fastly-ttl
14400.000
content-type
text/html;charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
max-age=14400
x-vcl-version
92
accept-ranges
bytes
x-fastly-stale
432000.000
x-cache-hits
45, 45, 5, 5
tile
www.computerworld.com/napi/
116 B
172 B
XHR
General
Full URL
https://www.computerworld.com/napi/tile?def=listItemList&genericIfCategoryEmpty=true&includeArticles=true&pageSize=4&queryKey=BestTechDeals&typeId=16&wrapperElement=ul&itemTemplate=%2Fwww.idge%2F_shared%2Fcomponents%2Fmodules%2Fitem%2Frelated-articles.jsp
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
c1145767f4465c4414b2e93324a70029c6b40f195a2667c5baf8821a5005cc4d

Request headers

Accept
*/*
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
vary
Accept-Encoding,Cookie
age
8155, 8155
x-cache
HIT, HIT, MISS, MISS
status
200
content-length
31
x-via-fastly
Verdad
x-served-by
cache-sjc3129-SJC, cache-sjc3129-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
server
Apache-Coyote/1.1
x-timer
S1573026221.119792,VS0,VE146
x-fastly-ttl
14400.000
content-type
text/html;charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
max-age=14400
x-vcl-version
92
accept-ranges
bytes, bytes, bytes
x-fastly-stale
432000.000
x-cache-hits
36, 36, 0, 0
tile
www.computerworld.com/napi/
4 KB
951 B
XHR
General
Full URL
https://www.computerworld.com/napi/tile?def=listItemList&genericIfCategoryEmpty=true&includeArticles=true&pageSize=4&queryKey=TechconnectDeals&brandOwnerOnly=true&brandOwner=4194304&wrapperElement=ul&itemTemplate=%2Fwww.idge%2F_shared%2Fcomponents%2Fmodules%2Fitem%2Frelated-articles.jsp
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
c50eb9228056c580ce24a5deeb621190877cd4369c70e8ff191aeb3f9148e3e1

Request headers

Accept
*/*
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
vary
Accept-Encoding,Cookie
age
8265
x-cache
HIT, HIT, HIT, HIT
status
200
content-length
706
x-via-fastly
Verdad
x-served-by
cache-sjc3120-SJC, cache-sjc3120-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
server
Apache-Coyote/1.1
x-timer
S1573026221.119831,VS0,VE0
x-fastly-ttl
14400.000
content-type
text/html;charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
max-age=14400
x-vcl-version
92
accept-ranges
bytes
x-fastly-stale
432000.000
x-cache-hits
1, 1, 5, 5
jquery.lazyload.min.js
www.computerworld.com/www/js/jquery/
3 KB
2 KB
XHR
General
Full URL
https://www.computerworld.com/www/js/jquery/jquery.lazyload.min.js?_=1573026220579
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
a193a57207a9fe3514d40f9f36426ce98dd4dfb8ec15277a9f3b9add4a09472f

Request headers

Accept
text/javascript, application/javascript, application/ecmascript, application/x-ecmascript, */*; q=0.01
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
age
514148
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
3, 3, 9, 9
content-length
1300
x-via-fastly
Verdad
x-served-by
cache-sjc3146-SJC, cache-sjc3146-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:14 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.121406,VS0,VE0
etag
W/"3396-1572467654000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 06:45:24 GMT
jquery.lazyload.min.js
www.computerworld.com/www/js/jquery/
3 KB
1 KB
XHR
General
Full URL
https://www.computerworld.com/www/js/jquery/jquery.lazyload.min.js?_=1573026220580
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Apache-Coyote/1.1 /
Resource Hash
a193a57207a9fe3514d40f9f36426ce98dd4dfb8ec15277a9f3b9add4a09472f

Request headers

Accept
text/javascript, application/javascript, application/ecmascript, application/x-ecmascript, */*; q=0.01
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
cors

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
age
514148
x-cache
HIT, HIT, HIT, HIT
status
200
x-cache-hits
3, 3, 10, 10
content-length
1300
x-via-fastly
Verdad
x-served-by
cache-sjc3146-SJC, cache-sjc3146-SJC, cache-hhn4042-HHN, cache-hhn4042-HHN
last-modified
Wed, 30 Oct 2019 20:34:14 GMT
server
Apache-Coyote/1.1
x-timer
S1573026221.124563,VS0,VE0
etag
W/"3396-1572467654000-gzip"
vary
Accept-Encoding,Cookie
content-type
application/javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=604800
x-vcl-version
92
accept-ranges
bytes
expires
Thu, 07 Nov 2019 06:45:24 GMT
async-ads.js
cse.google.com/adsense/search/
163 KB
57 KB
Script
General
Full URL
https://cse.google.com/adsense/search/async-ads.js
Requested by
Host: www.google.com
URL: https://www.google.com/cse/static/element/b5752d27691147d6/cse_element__en.js?usqp=CAI%3D
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:809::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
dc4a3e53165c3cd4219e2f9cbfc7529417112df54ac858e63345576de6e3f853
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"12368575020318973086"
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
x-xss-protection
0
expires
Wed, 06 Nov 2019 07:43:41 GMT
icon-image-zoom.png
idge.staticworld.net/idge/
2 KB
2 KB
Image
General
Full URL
https://idge.staticworld.net/idge/icon-image-zoom.png
Requested by
Host: www.google.com
URL: https://www.google.com/cse/static/element/b5752d27691147d6/cse_element__en.js?usqp=CAI%3D
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6bde799ee862bcc9d4296ecc2dafd95a1448d73efbde69849eb3709235f898fd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/www/css/article.css?v=20191105111835
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
tN8pHF9Hvh98woe6dmCenuQilhH7zVDX
via
1.1 varnish, 1.1 varnish
etag
"d3c79d98136025c6974915518ace3b17"
age
1656504
x-cache
HIT, HIT
status
200
content-length
1656
x-amz-id-2
9oy63QBRmbS4jrwWAKStiZypxx6xylNmFsI54r3y3HVZ21CjM6EEeVu5Xj78hZnk1+ruhomqfbA=
x-served-by
cache-jfk8141-JFK, cache-hhn4042-HHN
last-modified
Tue, 27 Mar 2018 00:09:57 GMT
server
AmazonS3
x-timer
S1573026221.136247,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:41 GMT
x-amz-request-id
B521E3D6A20EFFC3
cache-control
public, max-age=2592000
accept-ranges
bytes
content-type
image/png
x-cache-hits
4, 34
googlelogo_grey_46x15dp.png
www.google.com/cse/static/images/1x/
919 B
1 KB
Image
General
Full URL
https://www.google.com/cse/static/images/1x/googlelogo_grey_46x15dp.png
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
a844cdc48c7591822e45128a138f1dbba5753a3ca9992bd71c36758d51d0b68e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Fri, 01 Nov 2019 21:23:44 GMT
x-content-type-options
nosniff
last-modified
Tue, 13 Dec 2016 15:00:00 GMT
server
sffe
age
382797
content-type
image/png
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
919
x-xss-protection
0
expires
Sat, 31 Oct 2020 21:23:44 GMT
generate_204
clients1.google.com/
0
187 B
Image
General
Full URL
https://clients1.google.com/generate_204
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:800::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

status
204
date
Wed, 06 Nov 2019 07:43:41 GMT
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
l
use.typekit.net/af/e3ca36/00000000000000000000e805/27/
14 KB
14 KB
Font
General
Full URL
https://use.typekit.net/af/e3ca36/00000000000000000000e805/27/l?primer=7fa3915bdafdf03041871920a205bef951d72bf64dd4c4460fb992e3ecc3a862&fvd=n7&v=3
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/www/js/jquery/jquery-1.10.2.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
114edd54c074d906c568199ec4cd913f6f468eb46bbdc6925f2748d4602c3817

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
server
nginx
etag
"f04e66015b48bed6708639ded7923114ad09708a"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
14348
CIO-logo-blk-wht-no-tag.svg
alt.idgesg.net/images/furniture/cio/
1 KB
2 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/cio/CIO-logo-blk-wht-no-tag.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
f1b17f2f9534096425d6a28ed4a6c87f220b12a4b579c2936ab358e1da7de235

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
SWPVylTKhkXRLzcqckQyPzS2sW_WO6tj
via
1.1 varnish, 1.1 varnish
etag
"c164c10a34b9bb9602a3fa9fd11418f2"
age
3976
x-amz-meta-origin-date-iso8601
2019-10-30T17:26:32.000Z
x-cache
HIT, HIT
status
200
content-length
1326
x-amz-id-2
PWkhuBOP+QsvAncOutQlWV7YRZoSRpSKVyXp4TbfUR3jTCNFgZx3kuKJzMqecoc9SCQUYYRInJ8=
x-served-by
cache-jfk8121-JFK, cache-fra19164-FRA
last-modified
Wed, 30 Oct 2019 17:37:31 GMT
server
AmazonS3
x-timer
S1573026221.144448,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:41 GMT
x-amz-request-id
1F44FF13739A8ADE
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
1, 1
CSO-logo-white-no-tag.svg
alt.idgesg.net/images/furniture/cso/
2 KB
2 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/cso/CSO-logo-white-no-tag.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
1b9444bbd724775e014dfd48a961c462315239eb217180a1e0b1b471ef4c4b7c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
pdRyYNJia3lIsaf66p37pdEte3KoJwwZ
via
1.1 varnish, 1.1 varnish
etag
"5fbfeeb8fc48835e1d6e5819a42b6c0b"
age
3941
x-amz-meta-origin-date-iso8601
2018-11-02T18:18:46.000Z
x-cache
HIT, HIT
status
200
content-length
1730
x-amz-id-2
ld/eRtoAqKMcKK5Z7hhzCL838x8hO5ZEL4jSbqIWMENYcz0r4hnFGxUSlgFvaJ/rg+2ShptC0is=
x-served-by
cache-jfk8122-JFK, cache-fra19164-FRA
last-modified
Fri, 02 Nov 2018 20:25:26 GMT
server
AmazonS3
x-timer
S1573026221.144537,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:41 GMT
x-amz-request-id
86C345AA7BC4A7E2
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
2, 1
NetworkWorld_logo-white-no-tag.svg
alt.idgesg.net/images/furniture/networkworld/
3 KB
3 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/networkworld/NetworkWorld_logo-white-no-tag.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
cce1a9282d617a8475100f0a0505c83464852a4ec34ff854792d8af13dccb8aa

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
stYFwwJhU_K5wdqG2YDDTO_Y2rQjmQ4H
via
1.1 varnish, 1.1 varnish
etag
"e83d03b426e2cff512d1e2f8b00be3c6"
age
4362
x-amz-meta-origin-date-iso8601
2018-11-02T18:14:57.000Z
x-cache
HIT, HIT
status
200
content-length
2641
x-amz-id-2
iH7IL1TINbeKvEux54zKAxDYRAVhgUAVmVX+IceCsnq8hfr28L7+g1E4d6TBp8nb5D9ttJq104s=
x-served-by
cache-jfk8128-JFK, cache-fra19164-FRA
last-modified
Fri, 02 Nov 2018 20:26:11 GMT
server
AmazonS3
x-timer
S1573026221.144500,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:41 GMT
x-amz-request-id
1D50E79F60FFBFC2
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
3, 3628
InfoWorld_logo-white-no-tag.svg
alt.idgesg.net/images/furniture/infoworld/
3 KB
3 KB
Image
General
Full URL
https://alt.idgesg.net/images/furniture/infoworld/InfoWorld_logo-white-no-tag.svg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
17bb8b5dfa44693e301a436b03b03ef05ed0a581e6e036aef2756a5c03034356

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
iCWBp9tPxAaqtQ9G1uBiqNqsBKm09VdU
via
1.1 varnish, 1.1 varnish
etag
"dd990c1b71bf205702dbce78f3709d65"
age
2280
x-amz-meta-origin-date-iso8601
2018-11-02T18:22:02.000Z
x-cache
HIT, HIT
status
200
content-length
2598
x-amz-id-2
l2eA7CUSFPwjaoEcq2XchBQ9GjXw8Brh3/IDHrhzyNkUCRFGBTv0VnI6VXlTOFHSrERG+y3J3e8=
x-served-by
cache-jfk8146-JFK, cache-fra19164-FRA
last-modified
Fri, 02 Nov 2018 20:25:44 GMT
server
AmazonS3
x-timer
S1573026221.144542,VS0,VS0,VE0
date
Wed, 06 Nov 2019 07:43:41 GMT
x-amz-request-id
E0E0544F1F491750
accept-ranges
bytes
content-type
image/svg+xml
x-cache-hits
10, 1
truncated
/
120 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0275ec366f3cf18830eb5708a3f72ea10baf05a2f946c541e30691fa60ba4b54

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/png
1200x800-100816727-large.jpg
images.idgesg.net/images/article/2019/11/
601 KB
602 KB
Image
General
Full URL
https://images.idgesg.net/images/article/2019/11/1200x800-100816727-large.jpg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.165 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
5936c3beaad015599888d57fe413d7d980662b6f586550784693cd00c126f510

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
NONLRE2BoCZ23aBieGjl4IBUwhkeMsCD
via
1.1 varnish, 1.1 varnish
etag
"b3bb212b81059f418fade51417d1432d"
age
4648
x-cache
HIT, HIT
status
200
content-length
615685
x-amz-id-2
/9+aqEwCmKmLUvBC8sXzUKWyj7lq2VytN6VK/OWNMehZA7VmQeb53ym0Df01nD70r7iN8x61vnE=
x-served-by
cache-jfk8134-JFK, cache-hhn4042-HHN
last-modified
Tue, 05 Nov 2019 14:01:15 GMT
server
AmazonS3
x-timer
S1573026221.155023,VS0,VS0,VE1
date
Wed, 06 Nov 2019 07:43:41 GMT
x-amz-request-id
D90B676CE9529FDF
cache-control
public, max-age=2592000
accept-ranges
bytes
content-type
image/jpeg
x-cache-hits
1, 1
analytics.js
www.google-analytics.com/
43 KB
17 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WR6LD2P
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
dbb67c620eaabf6679a314db18d3ae43037aef71ab27422e6feec08ee987cc0a
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 19 Aug 2019 17:22:41 GMT
server
Golfe2
age
2956
date
Wed, 06 Nov 2019 06:54:25 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
17803
expires
Wed, 06 Nov 2019 08:54:25 GMT
minified_logic.js
automate-prod.s3.amazonaws.com/
16 KB
17 KB
XHR
General
Full URL
https://automate-prod.s3.amazonaws.com/minified_logic.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.218.212.138 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
339ddd9adc9d75824e6001d928d171dc089a061736444904e94f01256dc17d45

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:42 GMT
Last-Modified
Thu, 17 Oct 2019 19:00:36 GMT
Server
AmazonS3
x-amz-request-id
2DB19CEF1B9F8AFB
ETag
"c4703ea96079084af11a71b0c8aaa612"
Vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method
Access-Control-Allow-Methods
GET
Content-Type
application/javascript
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Accept-Ranges
bytes
Content-Length
16408
x-amz-id-2
nEPafbBIF+cwEhhthS11vYiMOI1Ap7RJd/X19iHmUU7EHlHlp3R8P1zUNjc4z9Xs2lnl8vZrKhw=
oct.js
static.ads-twitter.com/
Redirect Chain
  • https://platform.twitter.com/oct.js
  • https://static.ads-twitter.com/oct.js
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/oct.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.157 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
age
84640
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-hhn4031-HHN
last-modified
Tue, 23 Jan 2018 20:09:00 GMT
x-timer
S1573026221.457511,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes

Redirect headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:41 GMT
Server
ECS (fcn/40B6)
Content-Length
0
Location
https://static.ads-twitter.com/oct.js
Access-Control-Allow-Methods
GET
P3P
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
9694aa882dd83090c8baff998ebb5b60
idg.blueconic.net/plugin/library/
300 KB
87 KB
Script
General
Full URL
https://idg.blueconic.net/plugin/library/9694aa882dd83090c8baff998ebb5b60
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.81.224.214 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-81-224-214.compute-1.amazonaws.com
Software
- /
Resource Hash
0e04f98869d913dfdf71cc20a47560877bdc61b50e568f277dc526a9fd543ec2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
-
etag
9694aa882dd83090c8baff998ebb5b60
x-robots-tag
noindex, nofollow
p3p
policyref="", CP="DSP"
status
200
x-permitted-cross-domain-policies
master-only
cache-control
private, max-age=31536000
content-type
text/javascript; charset=utf-8
content-length
88868
x-xss-protection
1; mode=block
expires
Thu, 05 Nov 2020 07:43:41 GMT
LB-Zone-3
idg.blueconic.net/DG/DEFAULT/rest/rpc/json/
2 KB
1 KB
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json/LB-Zone-3?referer=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&bcsessionid=&bctempid=9789619c-13d9-43ab-9d91-9a77138845d7&overruleReferrer=&time=2019-11-06T08%3A43%3A41%2B01%3A00&ts=1573026221192
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.81.224.214 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-81-224-214.compute-1.amazonaws.com
Software
- /
Resource Hash
43883bcf4dbc16cda976295a156c509d981002666c271074008964de8df83e07
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
917
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
b2
sb.scorecardresearch.com/
Redirect Chain
  • https://sb.scorecardresearch.com/b?c1=2&c2=6035308&c3=&c5=Security&c6=Article%3A%20News%20Analysis&c15=3451956&ns__t=1573026221195&ns_c=UTF-8&cv=3.1e&c8=Why%20India%E2%80%99s%20data%20protection%20...
  • https://sb.scorecardresearch.com/b2?c1=2&c2=6035308&c3=&c5=Security&c6=Article%3A%20News%20Analysis&c15=3451956&ns__t=1573026221195&ns_c=UTF-8&cv=3.1e&c8=Why%20India%E2%80%99s%20data%20protection%2...
0
248 B
Image
General
Full URL
https://sb.scorecardresearch.com/b2?c1=2&c2=6035308&c3=&c5=Security&c6=Article%3A%20News%20Analysis&c15=3451956&ns__t=1573026221195&ns_c=UTF-8&cv=3.1e&c8=Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole%20%7C%20Computerworld&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c9=
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 07:43:41 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/b2?c1=2&c2=6035308&c3=&c5=Security&c6=Article%3A%20News%20Analysis&c15=3451956&ns__t=1573026221195&ns_c=UTF-8&cv=3.1e&c8=Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole%20%7C%20Computerworld&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c9=
Pragma
no-cache
Date
Wed, 06 Nov 2019 07:43:41 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
linkid.js
www.google-analytics.com/plugins/ua/
2 KB
1013 B
Script
General
Full URL
https://www.google-analytics.com/plugins/ua/linkid.js
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
92fca55833f48b4289ac8f1cedd48752b580fce4ec4b5d81670b8193d6e51b54
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:00:17 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Tue, 22 Oct 2019 18:15:00 GMT
server
sffe
age
2604
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
859
x-xss-protection
0
expires
Wed, 06 Nov 2019 08:00:17 GMT
publisher:getClientId
ampcid.google.com/v1/
74 B
512 B
XHR
General
Full URL
https://ampcid.google.com/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
991bfe84fec788f2b7d432b99a60c1e2aa2e799bc0137da8cf478299d0fc9a10
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://www.computerworld.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
94
x-xss-protection
0
l
use.typekit.net/af/2841b6/00000000000000000000e806/27/
14 KB
15 KB
Font
General
Full URL
https://use.typekit.net/af/2841b6/00000000000000000000e806/27/l?primer=7fa3915bdafdf03041871920a205bef951d72bf64dd4c4460fb992e3ecc3a862&fvd=i7&v=3
Requested by
Host: s.ntv.io
URL: https://s.ntv.io/serve/load.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.64.186 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-64-186.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
5a3f64319878922fc6e280ed38e952f43afd195a8aa254e04d8911a03005e1cc

Request headers

Sec-Fetch-Mode
cors
Referer
https://use.typekit.net/cav2eef.css
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
server
nginx
etag
"b00409cc89050d270de5f09dd609a8aae360c3fa"
status
200
content-type
application/font-woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
timing-allow-origin
*
content-length
14832
93486DB8DCD046258D9E15FD705FDAB1.png
ntvcld-a.akamaihd.net/image/upload/w_640,h_360,c_fill,g_auto:text,f_auto,fl_lossy,e_sharpen:70/assets/
29 KB
29 KB
Image
General
Full URL
https://ntvcld-a.akamaihd.net/image/upload/w_640,h_360,c_fill,g_auto:text,f_auto,fl_lossy,e_sharpen:70/assets/93486DB8DCD046258D9E15FD705FDAB1.png
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.16.186.99 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-99.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
ffa56467fa17a00d457cfce642e17b5af9b2503dee21e1add5068ec7f9ab70dd

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:41 GMT
Status
200 OK
Content-Disposition
inline; filename="93486DB8DCD046258D9E15FD705FDAB1.webp"
Connection
keep-alive
Content-Length
29190
X-Request-Id
b7234f4d67256532405269924d069c09
X-Served-By
cache-iad2128-IAD
Last-Modified
Tue, 05 Nov 2019 17:37:35 GMT
X-Timer
S1572980642.564108,VS0,VE1
ETag
"ad01923b985720df2d33e348116e77c6"
Content-Type
image/webp
Access-Control-Allow-Origin
*
Expires
Wed, 04 Nov 2020 19:04:12 GMT
Cache-Control
public, private, max-age=31490431
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Cache-Hits
1
trk.gif
jadserve.postrelease.com/
43 B
339 B
Image
General
Full URL
https://jadserve.postrelease.com/trk.gif?ntv_at=46,302&ntv_ui=44b90a3f-860c-4972-ab2d-e20ffc7d2046&ntv_a=W2wFAWDE-AXe4LA&ntv_fl=Js-9sgkIMAcneH5bOKp6X9uWqFUFyflRK83NhSSTeR4=&ord=1007618710&ntv_ht=rXnCXQA&ntv_tad=16&ntv_az=ws-4B8LPuAfCz7gH&ntv_al=ZfqWvGX6lr0=&ntv_ak=Ru1ugga0boJG7W6C&ntv_it
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.153.215.15 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-153-215-15.compute-1.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 07:43:41 GMT
server
nginx/1.12.1
status
200
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
image/gif
content-length
43
expires
Mon, 1 Jan 1990 12:00:00 GMT
trk.gif
jadserve.postrelease.com/
43 B
339 B
Image
General
Full URL
https://jadserve.postrelease.com/trk.gif?ntv_at=46&ntv_ui=0fb3fb67-232a-40d5-8691-084bafbb499f&ntv_a=X2wFAXDE-AeeoQA&ntv_fl=Js-9sgkIMAcneH5bOKp6X9uWqFUFyflRK83NhSSTeR4=&ord=1671311090&ntv_ht=rXnCXQA&ntv_tad=16&ntv_az=OFVE2jhVRNo4VUTa&ntv_al=dfpPPHX6Tz0=&ntv_ak=xeGKjYW4io3F4YqN&ntv_it
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.153.215.15 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-153-215-15.compute-1.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 07:43:41 GMT
server
nginx/1.12.1
status
200
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
image/gif
content-length
43
expires
Mon, 1 Jan 1990 12:00:00 GMT
1F83524F5DE147FFBE51905EDEB58C81.jpg
ntvcld-a.akamaihd.net/image/upload/w_640,h_360,c_fill,g_auto:text,f_auto/assets/
22 KB
23 KB
Image
General
Full URL
https://ntvcld-a.akamaihd.net/image/upload/w_640,h_360,c_fill,g_auto:text,f_auto/assets/1F83524F5DE147FFBE51905EDEB58C81.jpg
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
2.16.186.99 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a2-16-186-99.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
bd7d4699182be18a3847b17097dfb6eb21dfc587e0fbb271a3c2a800f2aeb458

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:41 GMT
Status
200 OK
Content-Disposition
inline; filename="1F83524F5DE147FFBE51905EDEB58C81.webp"
Connection
keep-alive
Content-Length
22992
X-Request-Id
dc6e1735a8ce604486f4fe7a9f2322c6
X-Served-By
cache-iad2130-IAD
Last-Modified
Tue, 05 Nov 2019 17:38:47 GMT
X-Timer
S1572976449.063118,VS0,VE1
ETag
"5bf68656827b22187b043847ca935e38"
Content-Type
image/webp
Access-Control-Allow-Origin
*
Expires
Wed, 04 Nov 2020 17:53:37 GMT
Cache-Control
public, private, max-age=31486196
Accept-Ranges
bytes
Timing-Allow-Origin
*
Access-Control-Allow-Headers
X-Requested-With,Range,User-Agent
X-Cache-Hits
1
trk.gif
jadserve.postrelease.com/
43 B
339 B
Image
General
Full URL
https://jadserve.postrelease.com/trk.gif?ntv_at=46&ntv_ui=646d532f-1ed8-4ddf-99e3-604761704eba&ntv_a=XGwFAWTE-A7ngQA&ntv_fl=Js-9sgkIMAcneH5bOKp6X9uWqFUFyflRK83NhSSTeR4=&ord=750090323&ntv_ht=rXnCXQA&ntv_tad=16&ntv_az=a90ChGvdAoRr3QKE&ntv_al=_rL3Ff6y9xQ=&ntv_ak=GmZJAlo_SQIaZkkC&ntv_it
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.153.215.15 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-35-153-215-15.compute-1.amazonaws.com
Software
nginx/1.12.1 /
Resource Hash
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 07:43:41 GMT
server
nginx/1.12.1
status
200
p3p
CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
access-control-allow-origin
*
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
content-type
image/gif
content-length
43
expires
Mon, 1 Jan 1990 12:00:00 GMT
publisher:getClientId
ampcid.google.de/v1/
3 B
441 B
XHR
General
Full URL
https://ampcid.google.de/v1/publisher:getClientId?key=AIzaSyA65lEHUEizIsNtlbNo-l2K18dT680nsaM
Requested by
Host: www.google-analytics.com
URL: https://www.google-analytics.com/analytics.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
ESF /
Resource Hash
ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
server
ESF
status
200
x-frame-options
SAMEORIGIN
content-type
application/json; charset=UTF-8
access-control-allow-origin
https://www.computerworld.com
access-control-expose-headers
content-encoding,date,server,content-length
cache-control
private
access-control-allow-credentials
true
vary
Origin, X-Origin, Referer
content-length
23
x-xss-protection
0
collect
www.google-analytics.com/r/
35 B
112 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j79&a=1647614318&t=pageview&_s=1&dl=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&ul=en-us&de=UTF-8&dt=Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole%20%7C%20Computerworld&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=aGBAAEAjAAQC~&jid=1814402190&gjid=1952343796&cid=279158102.1573026221&uid=&tid=UA-300704-1&_gid=1170576328.1573026221&_r=1&gtm=2wgav3WR6LD2P&cg1=security&cg2=newsanalysis&cg3=Mansi%20Joshi&cg4=article&cg5=us&cd1=false&cd2=&cd3=&cd4=notapplicable&cd5=Wed%2C%2006%20Nov%202019%2007%3A43%3A40%20GMT&cd6=Wed%2C%2006%20Nov%202019%2007%3A43%3A40%20GMT&cd7=0&cd8=1&cd9=production&cd10=computerworld&cd11=US&cd12=enterprise&cd13=false&cd14=&cd15=Web&cd16=&cd17=security&cd18=2206&cd19=technology%20industry&cd20=2206%2C3871&cd21=&cd22=&cd23=&cd24=&cd25=&cd26=newsanalysis&cd27=3451956&cd28=article&cd29=Mansi%20Joshi&cd30=computerworld&cd31=false&cd32=&cd33=&cd34=&cd35=&cd36=&cd37=false&cd38=1&cd39=2019-11-05&cd40=2019-11-05&cd41=0&cd42=0&cd43=false&cd44=false&cd45=&cd46=false&cd47=&cd48=&cd49=&cd50=&cd51=&cd52=&cd53=941&cd54=683&cd55=&cd56=&cd79=us&cd80=in&cd81=false&cd82=false&cd83=20191106065622&cd84=&z=326217078
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 07:43:41 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
fbevents.js
connect.facebook.net/en_US/
113 KB
26 KB
Script
General
Full URL
https://connect.facebook.net/en_US/fbevents.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
116ff98775e8503b1dd3cb9f9e96494ff88ee04a894778079370ff152f85f453
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
25312
x-xss-protection
0
pragma
public
x-fb-debug
7G9LG0mKiE6xdn7XNI+rseLeSE16imlYDDj4I0J9SUAp6S1Vzc0U8w3usXtUI7Aw1DoGKyWsIZzcSptKlRLRyw==
x-fb-trip-id
975780461
x-frame-options
DENY
date
Wed, 06 Nov 2019 07:43:41 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
111346X1569473.skimlinks.js
s.skimresources.com/js/
38 KB
15 KB
Script
General
Full URL
https://s.skimresources.com/js/111346X1569473.skimlinks.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtm.js?id=GTM-WR6LD2P
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
eb465d2a8aa11024600756e07415c4b6c639f97461062eae932b5f332270fa8f

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
last-modified
Tue, 05 Nov 2019 14:56:15 GMT
server
AmazonS3
x-amz-request-id
F0EA0BDD444D363A
etag
"50b2777bd0452e041c48c67702b3c613"
x-hw
1573026221.cds001.fr8.hc,1573026221.cds017.fr8.c
content-type
application/octet-stream
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
15052
x-amz-id-2
MI4Riej4wvMgocyrWOvhvoxbI7Q64ua7CJIJZFDGqbmeETN4JYkOm8zKnSF4I9aD/CmlBOQ9bjs=
783301121827721
connect.facebook.net/signals/config/
295 KB
70 KB
Script
General
Full URL
https://connect.facebook.net/signals/config/783301121827721?v=2.9.10&r=stable
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f01c:8012:face:b00c:0:3 , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
/
Resource Hash
3a8c11ed8694f75cf2265d188726c11349472c55c677753db79d8ad6339d0312
Security Headers
Name Value
Content-Security-Policy default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
Strict-Transport-Security max-age=31536000; preload; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; preload; includeSubDomains
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-23=":443"; ma=3600
content-length
72030
x-xss-protection
0
pragma
public
x-fb-debug
4NJLebXxjmhKjuYG0t5huJdQlDmDj3P8q6kvxwoFjytURJ1Da3PJ7Pj5XEF9unBbl928A5N8LHqpYBKIVsfz8w==
x-fb-trip-id
975780461
x-frame-options
DENY
date
Wed, 06 Nov 2019 07:43:41 GMT
vary
Accept-Encoding
content-type
application/x-javascript; charset=utf-8
cache-control
public, max-age=1200
content-security-policy
default-src * data: blob:;script-src *.facebook.com *.fbcdn.net *.facebook.net *.google-analytics.com *.virtualearth.net *.google.com 127.0.0.1:* *.spotilocal.com:* 'unsafe-inline' 'unsafe-eval' blob: data: 'self';style-src data: blob: 'unsafe-inline' *;connect-src *.facebook.com facebook.com *.fbcdn.net *.facebook.net *.spotilocal.com:* wss://*.facebook.com:* https://fb.scanandcleanlocal.com:* attachment.fbsbx.com ws://localhost:* blob: *.cdninstagram.com 'self' chrome-extension://boadgeojelhgndaghljhdicfkmllpafd chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm;
expires
Sat, 01 Jan 2000 00:00:00 GMT
px.gif
p.skimresources.com/
43 B
469 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=1&rn=5.954659542770139
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
date
Wed, 06 Nov 2019 07:43:41 GMT
x-guploader-uploadid
AEnB2UoS_2a1Wm7lRj6hzNDb6ImWm4wwnrV85pMcesfTlhoeDwlxR5bZtDJEn45_y4pN5FtCqdAGhzxcLmoWe-qYF3415kPs9A
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-hw
1573026221.cds001.fr8.hc,1573026221.cds054.fr8.c
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
px.gif
p.skimresources.com/
43 B
107 B
Image
General
Full URL
https://p.skimresources.com/px.gif?ch=2&rn=5.954659542770139
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.139.128.10 Dallas, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
Software
UploadServer /
Resource Hash
dcecab1355b5c2b9ecef281322bf265ac5840b4688748586e9632b473a5fe56b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-goog-hash
crc32c=xra6Ow==, md5=+DeqYLb+g0WPeQ22DVKfyQ==
date
Wed, 06 Nov 2019 07:43:41 GMT
x-guploader-uploadid
AEnB2UoS_2a1Wm7lRj6hzNDb6ImWm4wwnrV85pMcesfTlhoeDwlxR5bZtDJEn45_y4pN5FtCqdAGhzxcLmoWe-qYF3415kPs9A
x-goog-storage-class
MULTI_REGIONAL
status
200
x-goog-metageneration
4
x-goog-stored-content-encoding
identity
content-length
43
last-modified
Tue, 23 Oct 2018 13:19:28 GMT
server
UploadServer
etag
"f837aa60b6fe83458f790db60d529fc9"
x-hw
1573026221.cds001.fr8.hc,1573026221.cds054.fr8.c
x-goog-generation
1540300768038458
cache-control
public, max-age=7200
x-goog-stored-content-length
43
accept-ranges
bytes
content-type
image/gif
robots.txt
t.skimresources.com/api/v2/ Frame 4DB9
0
103 B
Image
General
Full URL
https://t.skimresources.com/api/v2/robots.txt?__skimjs_preflight__please_ignore__=true&rnd=0.8825856633570228
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

status
404
date
Wed, 06 Nov 2019 07:43:41 GMT
via
1.1 google
server
Python/3.7 aiohttp/3.5.4
alt-svc
clear
content-length
0
content-type
application/octet-stream
insight.min.js
snap.licdn.com/li.lms-analytics/
3 KB
2 KB
Script
General
Full URL
https://snap.licdn.com/li.lms-analytics/insight.min.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:6c00:296::25ea , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
41dd5e421fe221a7d2921d6fa2b36e8b01a9f2c054aaef5fad866fe896c1d1e0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:41 GMT
Content-Encoding
gzip
Last-Modified
Mon, 07 Oct 2019 16:41:31 GMT
X-CDN
AKAM
Vary
Accept-Encoding
Content-Type
application/x-javascript;charset=utf-8
Cache-Control
max-age=22982
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1576
uwt.js
static.ads-twitter.com/
5 KB
2 KB
Script
General
Full URL
https://static.ads-twitter.com/uwt.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.157 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
age
84642
x-cache
HIT
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200
content-length
1954
x-served-by
cache-hhn4031-HHN
last-modified
Tue, 23 Jan 2018 20:09:00 GMT
x-timer
S1573026222.501977,VS0,VE0
etag
"b7b33882a4f3ffd5cbf07434f3137166+gzip"
vary
Accept-Encoding,Host
content-type
application/javascript; charset=utf-8
via
1.1 varnish
cache-control
no-cache
accept-ranges
bytes
/
r.skimresources.com/api/
Redirect Chain
  • https://r.skimresources.com/api/
  • https://r.skimresources.com/api/?xguid=01DRZTPKEQWZARBKRXXJ4H7DM3&persistence=1&checksum=41eed60473e28c1a530a7a9f7b74c8383d21d577b2b5cf08a3bab4747613f40d
166 B
474 B
XHR
General
Full URL
https://r.skimresources.com/api/?xguid=01DRZTPKEQWZARBKRXXJ4H7DM3&persistence=1&checksum=41eed60473e28c1a530a7a9f7b74c8383d21d577b2b5cf08a3bab4747613f40d
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.59.101 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
101.59.190.35.bc.googleusercontent.com
Software
openresty/1.11.2.5 /
Resource Hash
54d42da4b3558115b15a7484c0410c0dc31987ac842e9f727c7b61e12ea95b35
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
openresty/1.11.2.5
status
200
vary
Accept-Encoding
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.computerworld.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google

Redirect headers

date
Wed, 06 Nov 2019 07:43:41 GMT
via
1.1 google
server
openresty/1.11.2.5
status
307
location
//r.skimresources.com/api/?xguid=01DRZTPKEQWZARBKRXXJ4H7DM3&persistence=1&checksum=41eed60473e28c1a530a7a9f7b74c8383d21d577b2b5cf08a3bab4747613f40d
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.computerworld.com
access-control-allow-credentials
true
content-type
text/html
alt-svc
clear
content-length
193
/
www.facebook.com/tr/
44 B
359 B
Image
General
Full URL
https://www.facebook.com/tr/?id=783301121827721&ev=PageView&dl=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&rl=&if=false&ts=1573026221519&sw=1600&sh=1200&v=2.9.10&r=stable&ec=0&o=30&fbp=fb.1.1573026221518.1155614167&it=1573026221490&coo=false&rqm=GET
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-23=":443"; ma=3600
content-length
44
expires
Wed, 06 Nov 2019 07:43:41 GMT
/
www.facebook.com/tr/
44 B
212 B
Image
General
Full URL
https://www.facebook.com/tr/?id=783301121827721&ev=ViewContent&dl=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&rl=&if=false&ts=1573026221520&sw=1600&sh=1200&v=2.9.10&r=stable&ec=1&o=30&fbp=fb.1.1573026221518.1155614167&it=1573026221490&coo=false&rqm=GET
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
10d8d42d73a02ddb877101e72fbfa15a0ec820224d97cedee4cf92d571be5caa
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
last-modified
Fri, 21 Dec 2012 00:00:01 GMT
server
proxygen-bolt
strict-transport-security
max-age=31536000; includeSubDomains
content-type
image/gif
status
200
cache-control
no-cache, must-revalidate, max-age=0
alt-svc
h3-23=":443"; ma=3600
content-length
44
expires
Wed, 06 Nov 2019 07:43:41 GMT
collect
px.ads.linkedin.com/
Redirect Chain
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=45909%2C1156330%2C116509&url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfectio...
  • https://www.linkedin.com/px/li_sync?redirect=https%3A%2F%2Fpx.ads.linkedin.com%2Fcollect%3Fv%3D2%26fmt%3Djs%26pid%3D45909%252C1156330%252C116509%26url%3Dhttps%253A%252F%252Fwww.computerworld.com%25...
  • https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=45909%2C1156330%2C116509&url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfectio...
0
87 B
Image
General
Full URL
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=45909%2C1156330%2C116509&url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&time=1573026221526&liSync=true
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a05:f500:10:101::b93f:9105 , Ireland, ASN14413 (LINKEDIN - LinkedIn Corporation, US),
Reverse DNS
Software
Play /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
server
Play
vary
Accept-Encoding
x-li-fabric
prod-lva1
status
200
x-li-proto
http/2
x-li-pop
prod-efr5
content-type
application/javascript
content-length
20
x-li-uuid
BT/9tAOD1BUA9ifUlysAAA==

Redirect headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
302
vary
Accept-Encoding
content-length
20
x-li-uuid
lbeVrgOD1BXgFA3giisAAA==
server
Play
pragma
no-cache
x-li-pop
prod-efr5
x-frame-options
sameorigin
expect-ct
max-age=86400, report-uri="https://www.linkedin.com/platform-telemetry/ct"
strict-transport-security
max-age=2592000
x-li-fabric
prod-lva1
location
https://px.ads.linkedin.com/collect?v=2&fmt=js&pid=45909%2C1156330%2C116509&url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&time=1573026221526&liSync=true
x-xss-protection
1; mode=block
cache-control
no-cache, no-store
content-security-policy
default-src *; connect-src 'self' static.licdn.com media.licdn.com static-exp1.licdn.com static-exp2.licdn.com static-exp3.licdn.com media-exp1.licdn.com media-exp2.licdn.com https://media-src.linkedin.com/media/ www.linkedin.com s.c.lnkd.licdn.com m.c.lnkd.licdn.com s.c.exp1.licdn.com s.c.exp2.licdn.com m.c.exp1.licdn.com m.c.exp2.licdn.com wss://*.linkedin.com dms.licdn.com https://dpm.demdex.net/id https://lnkd.demdex.net/event blob:; img-src data: blob: *; font-src data: *; style-src 'unsafe-inline' 'self' static-src.linkedin.com *.licdn.com; script-src 'report-sample' 'unsafe-inline' 'unsafe-eval' 'self' platform.linkedin.com spdy.linkedin.com static-src.linkedin.com *.ads.linkedin.com *.licdn.com static.chartbeat.com www.google-analytics.com ssl.google-analytics.com bcvipva02.rightnowtech.com www.bizographics.com sjs.bizographics.com js.bizographics.com d.la4-c1-was.salesforceliveagent.com slideshare.www.linkedin.com https://snap.licdn.com/li.lms-analytics/insight.min.js; object-src 'none'; media-src blob: *; child-src blob: lnkd-communities: voyager: *; frame-ancestors 'self'
x-li-proto
http/2
expires
Thu, 01 Jan 1970 00:00:00 GMT
adsct
t.co/i/
43 B
448 B
Image
General
Full URL
https://t.co/i/adsct?p_id=Twitter&p_user_id=0&txn_id=nvk5o&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.5 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
ac8778041fdb7f2e08ceb574c9a766247ea26f1a7d90fa854c4efcf4b361a957
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
content-length
65
x-xss-protection
0
x-response-time
109
pragma
no-cache
last-modified
Wed, 06 Nov 2019 07:43:41 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=0
content-type
image/gif;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
09996639e11c20bba2e9694f9be7d559
x-transaction
00d79d2700e18eed
expires
Tue, 31 Mar 1981 05:00:00 GMT
iab
api.skimlinks.mgr.consensu.org/
772 B
642 B
XHR
General
Full URL
https://api.skimlinks.mgr.consensu.org/iab?nocache=1573026221551
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/111346X1569473.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.190.40.172 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
172.40.190.35.bc.googleusercontent.com
Software
nginx/1.14.0 /
Resource Hash
4898c2b9f8c2f931ef6a819d36e0019867931d9519af933ab4bd5edce724b2a8
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
nginx/1.14.0
access-control-allow-headers
*
status
200
vary
Accept-Encoding
access-control-allow-methods
GET, POST, PUT, DELETE, OPTIONS
p3p
CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
access-control-allow-origin
https://www.computerworld.com
access-control-allow-credentials
true
content-type
application/json
alt-svc
clear
via
1.1 google
page
t.skimresources.com/api/v2/
22 B
91 B
XHR
General
Full URL
https://t.skimresources.com/api/v2/page
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/111346X1569473.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-type
text/plain

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 07:43:41 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://www.computerworld.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
alt-svc
clear
content-length
22
link
t.skimresources.com/api/v2/
22 B
389 B
XHR
General
Full URL
https://t.skimresources.com/api/v2/link
Requested by
Host: s.skimresources.com
URL: https://s.skimresources.com/js/111346X1569473.skimlinks.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
35.201.67.47 , Ascension Island, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
47.67.201.35.bc.googleusercontent.com
Software
Python/3.7 aiohttp/3.5.4 /
Resource Hash
fcc83a5b6aef86420c1ad553167106df96bd0ff4192ffe52b1647599948edbcf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-type
text/plain

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 07:43:41 GMT
via
1.1 google
x-content-type-options
nosniff
server
Python/3.7 aiohttp/3.5.4
access-control-allow-headers
Origin, Accept, Content-Type, X-Requested-With, X-CSRF-Token
status
200
access-control-allow-methods
GET, POST, OPTIONS
content-type
text/plain; charset=utf-8, application/javascript
access-control-allow-origin
https://www.computerworld.com
cache-control
no-store, no-cache, must-revalidate
access-control-allow-credentials
true
alt-svc
clear
content-length
22
d3d3LmNvbXB1dGVyd29ybGQuY29t
tcheck.outbrainimg.com/tcheck/check/
16 B
476 B
XHR
General
Full URL
https://tcheck.outbrainimg.com/tcheck/check/d3d3LmNvbXB1dGVyd29ybGQuY29t
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573026220578
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.70.82 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-70-82.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
929701ed632814943e3df803ddd9e3f179ccf889c0ad7b7f3392bd8d109b174f
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
ETag
W/"10-us8lSJutAxKqLzf8c1+n5XstcwY"
Access-Control-Max-Age
43200
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=4733
Date
Wed, 06 Nov 2019 07:43:41 GMT
Connection
keep-alive
Access-Control-Allow-Credentials
false
Content-Length
16
Expires
Wed, 06 Nov 2019 09:02:34 GMT
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
2 KB
2 KB
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&bcsessionid=9789619c-13d9-43ab-9d91-9a77138845d7&bctempid=&overruleReferrer=&time=2019-11-06T08%3A43%3A41%2B01%3A00&ts=1573026221619
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.81.224.214 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-81-224-214.compute-1.amazonaws.com
Software
- /
Resource Hash
e6e4378d581447fec12b1496cae95bc20ccd5db33079b995352f064ff86c238e
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
907
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
2 KB
2 KB
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&bcsessionid=9789619c-13d9-43ab-9d91-9a77138845d7&bctempid=&overruleReferrer=&time=2019-11-06T08%3A43%3A41%2B01%3A00&ts=1573026221629
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.81.224.214 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-81-224-214.compute-1.amazonaws.com
Software
- /
Resource Hash
8db31f8aa4b0bc820762b36b190c32ecedfb777e0a9d0b1d5dfa03817575e809
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
908
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
stats
idg.blueconic.net/rest/recommendations/
14 B
525 B
Script
General
Full URL
https://idg.blueconic.net/rest/recommendations/stats?storeId=6cca0c88-4d90-409e-8e8e-3897724a791a&action=view&itemId=www.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html&url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html&profileId=9789619c-13d9-43ab-9d91-9a77138845d7&isEntrypage=true&hash=ef5cfcbf4386589710cd57648dc95bcd&referer=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&bcsessionid=9789619c-13d9-43ab-9d91-9a77138845d7&bctempid=&overruleReferrer=&time=2019-11-06T08%3A43%3A41%2B01%3A00&callback=bc_json998
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.81.224.214 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-81-224-214.compute-1.amazonaws.com
Software
- /
Resource Hash
4c14570e4bb409fbaa863d6e0691cccb9cfa3068c1118cf23bfb4280bc75bbc0
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
-
x-robots-tag
noindex, nofollow
p3p
policyref="", CP="DSP"
status
200
x-permitted-cross-domain-policies
master-only
cache-control
no-cache, no-store, no-transform, must-revalidate, private
content-type
text/javascript;charset=utf-8
content-length
34
x-xss-protection
1; mode=block
expires
Thu, 01 Jan 1970 00:00:00 GMT
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
94 B
981 B
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&bcsessionid=9789619c-13d9-43ab-9d91-9a77138845d7&bctempid=&overruleReferrer=&time=2019-11-06T08%3A43%3A41%2B01%3A00&ts=1573026221659
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.81.224.214 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-81-224-214.compute-1.amazonaws.com
Software
- /
Resource Hash
5b5931d40a95c63a9633f9c146820a0834f92ae18e05d09efd610fe92a9f2982
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
105
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
collect
www.google-analytics.com/
35 B
122 B
Image
General
Full URL
https://www.google-analytics.com/collect?v=1&_v=j79&a=1647614318&t=event&ni=1&_s=1&dl=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&ul=en-us&de=UTF-8&dt=Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole%20%7C%20Computerworld&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&ec=BlueConic%20Data&ea=success&_u=aGDAAEAjAAQC~&jid=&gjid=&cid=279158102.1573026221&uid=&tid=UA-300704-1&_gid=1170576328.1573026221&gtm=2wgav3WBVXW9&cg1=security&cg2=newsanalysis&cg3=Mansi%20Joshi&cg4=article&cg5=us&cd1=false&cd2=&cd3=&cd4=notapplicable&cd5=Wed%2C%2006%20Nov%202019%2007%3A43%3A40%20GMT&cd6=Wed%2C%2006%20Nov%202019%2007%3A43%3A40%20GMT&cd7=0&cd8=1&cd9=production&cd10=computerworld&cd11=US&cd12=enterprise&cd13=false&cd14=&cd15=Web&cd16=&cd17=security&cd18=2206&cd19=technology%20industry&cd20=2206%2C3871&cd21=&cd22=&cd23=&cd24=&cd25=&cd26=newsanalysis&cd27=3451956&cd28=article&cd29=Mansi%20Joshi&cd30=computerworld&cd31=false&cd32=&cd33=&cd34=&cd35=&cd36=&cd37=false&cd38=1&cd39=2019-11-05&cd40=2019-11-05&cd41=0&cd42=0&cd43=false&cd44=false&cd45=&cd46=false&cd47=&cd48=&cd49=&cd50=&cd51=&cd52=&cd53=941&cd54=683&cd55=&cd56=&cd79=us&cd80=in&cd58=9789619c-13d9-43ab-9d91-9a77138845d7&cd59=0&cd60=Placement%20ID%7CAll%20Visitors%7CVisited%20any%20B2B%7CNot%20subscribed%20to%20Sailthru%7CVisitors%20not%20in%20segment%20%22zach%20test%20segment%22%7CCW%20visitors%7C%5BBC%20Expert%5D%20%E2%80%93%20Unknown%20(no%20email%20address)%7CIP%20address%7CLanded%20through%20campaign&z=1369254758
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 01 Nov 2019 02:58:59 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
age
449082
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
35
expires
Mon, 01 Jan 1990 00:00:00 GMT
dwce_cheq_events
log.outbrainimg.com/loggerServices/
4 B
344 B
XHR
General
Full URL
https://log.outbrainimg.com/loggerServices/dwce_cheq_events?timestamp=1573026221662&sessionId=c10d1d3b-3aa4-7b59-4217-aa2f51d0cc18&url=www.computerworld.com&cheqSource=1&cheqEvent=0&exitReason=2
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573026220578
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.63 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 07:43:41 GMT
Access-Control-Allow-Methods
GET,POST
Content-Type
application/json; charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
no-cache, no-store, must-revalidate
Connection
close
X-TraceId
9ac0ca885427d5125f69b7c6517a817b
Content-Length
4
Expires
0
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
105 B
676 B
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&bcsessionid=No%20profile%20present%20and%20will%20not%20be%20created.&bctempid=&overruleReferrer=&time=2019-11-06T08%3A43%3A41%2B01%3A00&ts=1573026221826
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.81.224.214 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-81-224-214.compute-1.amazonaws.com
Software
- /
Resource Hash
3da666e4691a8a33de77807201c2129518bee8f186e594208783121b5032e3f5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 07:43:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
114
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
xp35fk24bu8fvo1ajpk3qdt2izxuffjj
automate.linksynergy.com/wakeup/
38 B
592 B
XHR
General
Full URL
https://automate.linksynergy.com/wakeup/xp35fk24bu8fvo1ajpk3qdt2izxuffjj
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.224.34.200 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-224-34-200.compute-1.amazonaws.com
Software
nginx/1.12.2 /
Resource Hash
dc8f8ba0a0fc19b41c98427556de43ce8d80873d74b3a9af5d81e6b5b69b4150
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:42 GMT
Server
nginx/1.12.2
X-Frame-Options
SAMEORIGIN
Access-Control-Allow-Methods
PUT, OPTIONS, POST
P3p
CP="NOI DSP COR CURa ADMa DEVa OUR BUS STA"
Access-Control-Allow-Origin
https://www.computerworld.com
Access-Control-Allow-Credentials
true
Connection
keep-alive
Content-Type
application/json
Access-Control-Allow-Headers
Content-Type
Content-Length
38
xp35fk24bu8fvo1ajpk3qdt2izxuffjj
automate-prod.s3.amazonaws.com/info/
161 KB
161 KB
XHR
General
Full URL
https://automate-prod.s3.amazonaws.com/info/xp35fk24bu8fvo1ajpk3qdt2izxuffjj
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.218.212.138 Boardman, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
af05895b7328c2ca16bb69f9b8a1f904f45a5457a29320de0755ad784c29a43f

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:43 GMT
Last-Modified
Tue, 05 Nov 2019 21:09:39 GMT
Server
AmazonS3
x-amz-request-id
6C51F841DBF62787
ETag
"6c810e16db769b0fba5a83d31b4df95e"
Vary
Origin, Access-Control-Request-Headers, Access-Control-Request-Method
Access-Control-Allow-Methods
GET
Content-Type
text/plain
Access-Control-Allow-Origin
*
Access-Control-Max-Age
3000
Accept-Ranges
bytes
Content-Length
164656
x-amz-id-2
FFQBvYPpiBTyflTqkbari7lY0G/jNDvfUdJHBaCZQcv8J5pBo7xhPWRyop1UK+tjGFrkZFtGbAg=
adsct
analytics.twitter.com/i/
31 B
634 B
Script
General
Full URL
https://analytics.twitter.com/i/adsct?p_id=Twitter&p_user_id=0&txn_id=nvk5o&events=%5B%5B%22pageview%22%2Cnull%5D%5D&tw_sale_amount=0&tw_order_quantity=0&tw_iframe_status=0&tpx_cb=twttr.conversion.loadPixels&tw_document_href=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622
Requested by
Host: static.ads-twitter.com
URL: https://static.ads-twitter.com/uwt.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.131 , United States, ASN13414 (TWITTER - Twitter Inc., US),
Reverse DNS
Software
tsa_o /
Resource Hash
df3e003cc30e9bdd0313100e8ee5d468070b4b34d11ad355f276a356d4b9c7bf
Security Headers
Name Value
Strict-Transport-Security max-age=631138519
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
CP="CAO DSP LAW CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV INT"
status
200, 200 OK
x-twitter-response-tags
BouncerCompliant
strict-transport-security
max-age=631138519
content-length
57
x-xss-protection
0
x-response-time
114
pragma
no-cache
last-modified
Wed, 06 Nov 2019 07:43:42 GMT
server
tsa_o
x-frame-options
SAMEORIGIN
content-type
application/javascript;charset=utf-8
cache-control
no-cache, no-store, must-revalidate, pre-check=0, post-check=0
x-connection-hash
7874cd485cb9998379bffaa2d0d634a4
x-transaction
00a71d71007144f8
expires
Tue, 31 Mar 1981 05:00:00 GMT
connatix.renderer.infeed.min.js
cdn.connatix.com/min/
957 B
1 KB
Script
General
Full URL
https://cdn.connatix.com/min/connatix.renderer.infeed.min.js
Requested by
Host: www.computerworld.com
URL: https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash
a68bb064f603d2e0bfeb4ba53f476efb38b56a7b52a9437fb67a05519527881c

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:42 GMT
via
1.1 varnish
server
Varnish
age
0
x-served-by
cache-hhn4048-HHN
x-cache
HIT
content-type
application/javascript
status
200
x-referer-host
computerworld.com
cache-control
no-cache, no-store, must-revalidate, max-age=0
accept-ranges
bytes
x-timer
S1573026222.011627,VS0,VE0
content-length
957
retry-after
0
x-cache-hits
0
connatix.renderer.infeed.min_dc.js
cdns.connatix.com/p/1784/min/ Frame 64AB
718 KB
186 KB
Script
General
Full URL
https://cdns.connatix.com/p/1784/min/connatix.renderer.infeed.min_dc.js
Requested by
Host: cdn.connatix.com
URL: https://cdn.connatix.com/min/connatix.renderer.infeed.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
7b2c189a93fd17b7f9ed38cb76de18dd793c01fce2bd8e29beeccb2dd8174867

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:42 GMT
content-encoding
gzip
age
81230
x-cache
HIT, HIT
status
200
content-length
190548
x-served-by
cache-dca17728-DCA, cache-hhn4048-HHN
access-control-allow-origin
*
last-modified
Tue, 05 Nov 2019 08:58:49 GMT
x-timer
S1573026222.031011,VS0,VE0
etag
"b9725a8aae61033fce0c8c538ca9d474"
vary
Accept-Encoding
content-type
application/x-javascript
via
1.1 varnish, 1.1 varnish
cache-control
max-age=31557600
accept-ranges
bytes
x-cache-hits
1, 3799
/
www.facebook.com/tr/
0
111 B
Other
General
Full URL
https://www.facebook.com/tr/
Requested by
Host: connect.facebook.net
URL: https://connect.facebook.net/en_US/fbevents.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a03:2880:f11c:8183:face:b00c:0:25de , Ireland, ASN32934 (FACEBOOK - Facebook, Inc., US),
Reverse DNS
Software
proxygen-bolt /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
multipart/form-data; boundary=----WebKitFormBoundarypkg1ArBlOUqaxFFl

Response headers

strict-transport-security
max-age=31536000; includeSubDomains
server
proxygen-bolt
date
Wed, 06 Nov 2019 07:43:42 GMT
status
200
content-type
text/plain
access-control-allow-origin
https://www.computerworld.com
access-control-allow-credentials
true
alt-svc
h3-23=":443"; ma=3600
content-length
0
g
ck.connatix.com/
46 B
103 B
Script
General
Full URL
https://ck.connatix.com/g?callback=cnxJSONP_ed6ef9ad019cd9e1afcc1573026222073
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1784/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
Varnish /
Resource Hash
9087ce5cbe847f6d7e4b1c03b9f9a1e7e08e7ccbff711d790dc24f8b7d2eda66

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:42 GMT
via
1.1 varnish
server
Varnish
age
0
x-served-by
cache-hhn4048-HHN
x-cache
HIT
status
200
cache-control
no-cache, no-store, must-revalidate, max-age=0
accept-ranges
bytes
x-timer
S1573026222.089239,VS0,VE0
content-length
46
retry-after
0
x-cache-hits
0
pls
core.connatix.com/ Frame 64AB
4 KB
2 KB
Script
General
Full URL
https://core.connatix.com/pls?callback=jQuery32107276350103140923_1573026222066&token=fd16fb87-3a00-4fa6-9f4a-a3057d6342f0&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c_v=1784_0_0_0_1&page_guid=51930071f65ac5a609c61573026222123&spp=1&_=1573026222067
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1784/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.236.131.34 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-236-131-34.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
3de3c7dd499a23f5d2a857a151d725d7274ab33cbae86895d4a332e4a6a9ee40

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

status
200
date
Wed, 06 Nov 2019 07:43:42 GMT
content-encoding
gzip
server
nginx/1.15.9 (Ubuntu)
access-control-allow-origin
*
get
odb.outbrain.com/utils/
34 KB
13 KB
Script
General
Full URL
https://odb.outbrain.com/utils/get?url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html&settings=true&recs=true&widgetJSId=AR_1&key=NANOWDGT01&idx=0&version=104070&apv=false&sig=WcDMITOl&format=html&va=true&rand=35288&pdobuid=-1&osLang=en-US&winW=1600&winH=1200&scrW=1600&scrH=1200&adblck=false&secured=true&cmpStat=1&ref=
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573026220578
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
30203b41a263850e30a851dbda0b6b3d91fed30a4ca9bfcf3fa0536ddf966cf7
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

strict-transport-security
max-age=0; includeSubDomains;
content-encoding
gzip
traffic-path
NYDC1, JFK, FRA, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-cache-hits
0, 0
x-traceid
2203953df5362ddad804411b18bcbef1
content-length
12654
x-served-by
cache-jfk8137-JFK, cache-fra19160-FRA
pragma
no-cache
x-timer
S1573026222.212758,VS0,VE136
date
Wed, 06 Nov 2019 07:43:42 GMT
vary
Accept-Encoding, User-Agent
content-type
text/x-json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
no-cache
backend-ip
104.156.90.37
accept-ranges
bytes, bytes
expires
Thu, 01 Jan 1970 00:00:00 GMT
ob_smartFeedLogo.min.svg
widgets.outbrain.com/images/widgetIcons/
7 KB
7 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/ob_smartFeedLogo.min.svg
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573026220578
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.69.225 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-69-225.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
8050f05c230d74be333b63cef230e786094e9100f55fa19c6c0831e95870768d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:42 GMT
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"f370d19306add072a726e7f4ade8dc57:1572966023"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/svg+xml
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
7090
achoice.svg
widgets.outbrain.com/images/widgetIcons/
3 KB
2 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/achoice.svg
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573026220578
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.69.225 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-69-225.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
2c87952cc1c23627496c7874271042bdb6af21efdf7cbf36ec4d98e6cec34d04

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:42 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"9d26fa4e7238ed94f1d0d92afb453b3e:1572966000"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
image/svg+xml
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
1368
l
mcdp-nydc1.outbrain.com/
4 B
376 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=42ab7f7900072eddb390e324256ae5ef_28423_1573026222288&tm=829&eT=0&widgetWidth=970&widgetHeight=694&widgetX=315&widgetY=4859&wRV=104070&pVis=1&lsd=be69e2e2-d8dc-451d-a71a-27f02759a30d&eIdx=&cheq=0&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573026220578
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.31 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:42 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
48689ff8070b1f1388e0148f27e9b91
Content-Length
30
proxy.js
widgets.outbrain.com/nanoWidget/104070/module/
823 B
853 B
Script
General
Full URL
https://widgets.outbrain.com/nanoWidget/104070/module/proxy.js
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573026220578
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.69.225 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-69-225.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
a95b9d7926bbd7b2c530faf8bd0352491a539758540b78749372927bd8716b14

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:42 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"ddd80d77cddabf6732bc5d9534b86f1d:1572966052"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=345600
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
360
obUserSync.html
widgets.outbrain.com/widgetOBUserSync/ Frame BAD0
0
0
Document
General
Full URL
https://widgets.outbrain.com/widgetOBUserSync/obUserSync.html
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573026220578
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.69.225 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-69-225.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash

Request headers

Host
widgets.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Accept-Encoding
gzip, deflate, br
Cookie
akacd_widgets_routing=3750479020~rv=6~id=eb3b6860bf812c78daf3f70c69e48f33; recs_66d352a46e2abe4affc72602ae4978bd=0B2395937617A2229989104A2361454795A2435535374A2452762547A1698564504ACD1; obuid=be69e2e2-d8dc-451d-a71a-27f02759a30d
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622

Response headers

Server
Apache
ETag
"92a540925bae013b3eb0aec73fff0e65:1572781658"
Last-Modified
Sun, 03 Nov 2019 11:44:44 GMT
Accept-Ranges
bytes
Content-Type
text/html
Vary
Accept-Encoding
Content-Encoding
gzip
Cache-Control
max-age=604800
Date
Wed, 06 Nov 2019 07:43:42 GMT
Content-Length
3504
Connection
keep-alive
Timing-Allow-Origin
*
Access-Control-Allow-Credentials
false
Access-Control-Allow-Methods
GET,POST
Access-Control-Allow-Origin
*
NVPInjector.min.js
widgets.outbrain.com/nativeVideoPlayer/
13 KB
5 KB
Script
General
Full URL
https://widgets.outbrain.com/nativeVideoPlayer/NVPInjector.min.js
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573026220578
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.69.225 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-69-225.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
2e5db12b7bc11cb638f81918df0b68bc7026a2c1e29ac02f2e056dba2cf7303b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:42 GMT
Content-Encoding
gzip
Last-Modified
Wed, 01 May 2019 09:33:13 GMT
Server
Apache
ETag
"5cce9fcde7926b25032da388b4c2be7f:1556703193"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=345600
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
4726
streamFeed.js
widgets.outbrain.com/nanoWidget/104070/module/
39 KB
13 KB
Script
General
Full URL
https://widgets.outbrain.com/nanoWidget/104070/module/streamFeed.js
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573026220578
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.69.225 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-69-225.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
99401b4affbff50814c870c81139a860c1db634186af1a7d656d74d88eb733a6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:42 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"a9d6b8c7aab4d69558f75f6d9bc46807:1572966063"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=345600
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
13008
play_100x100.png
widgets.outbrain.com/images/widgetIcons/
9 KB
10 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/play_100x100.png
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.69.225 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-69-225.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
bbcd8c21e24392c2c8ef2c5df39578e95b2bff035be4930cbc53b996087783a6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:42 GMT
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"25a69b3019e3b959aef033482762080f:1572966031"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
9422
vidget.js
libs.outbrain.com/vidget/
116 KB
29 KB
Script
General
Full URL
https://libs.outbrain.com/vidget/vidget.js
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573026220578
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.69.225 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-69-225.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
48034e50da660af17f1ee90536b337d7bd83170341ebc96d9d4386f14a61d12b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:42 GMT
Content-Encoding
gzip
Connection
keep-alive
Content-Length
28849
Pragma
no-cache
Last-Modified
Tue, 05 Nov 2019 08:52:04 GMT
Server
Apache
ETag
"4028987819465583586db0cb5865fdb1:1572943924"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Wed, 06 Nov 2019 07:43:42 GMT
obp.min.js
libs.sphere.com/video/outbrain-player/current/
94 KB
20 KB
Script
General
Full URL
https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/nativeVideoPlayer/NVPInjector.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.250 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-250.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
73094735f396bba106c04ae44386ab03f8b50605bb0a622f8b57b067ad5f428e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:42 GMT
Content-Encoding
gzip
Connection
keep-alive
Content-Length
20382
Pragma
no-cache
Last-Modified
Wed, 30 Oct 2019 07:58:51 GMT
Server
Apache
ETag
"82e1acf271a9cf172b590be5d2c0089c:1572422331"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
application/x-javascript
Access-Control-Allow-Origin
*
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Wed, 06 Nov 2019 07:43:42 GMT
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9d02d662da8a47fb5fb610b545007507b6017028043dbb63cd09ec897d3b9627

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
715 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5a3f1dd74233f605e511f1b5b244bedf85ac88ba264caf4d6401bc7ec2017dcd

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/png
1.jpg
i.connatix.com/s3/connatix-uploads/f7e93031-3802-49c9-b029-968fa78207fd/
12 KB
12 KB
Image
General
Full URL
https://i.connatix.com/s3/connatix-uploads/f7e93031-3802-49c9-b029-968fa78207fd/1.jpg?mode=stretch&connatiximg=true&scale=both&height=225&width=400
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
b12dce78cf2b8b83b42e726d08b927c403c12fc923732ffc3d0adac01a90c41b

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:42 GMT
via
1.1 varnish, 1.1 varnish
age
86568
x-served-by
cache-sjc3141-SJC, cache-fra19149-FRA
status
200
x-cache
HIT, HIT
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes
x-timer
S1573026223.684183,VS0,VE0
content-length
11995
x-cache-hits
1, 1
ima3.js
imasdk.googleapis.com/js/sdkloader/ Frame 64AB
273 KB
93 KB
Script
General
Full URL
https://imasdk.googleapis.com/js/sdkloader/ima3.js
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1784/min/connatix.renderer.infeed.min_dc.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
08d851026bab1d4b8c1e46b8713c9a5821f7c5dcfd058735f9e036aac5197553
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900, stale-while-revalidate=3600
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
94730
x-xss-protection
0
expires
Wed, 06 Nov 2019 07:43:42 GMT
play_100x100.png
widgets.outbrain.com/images/widgetIcons/
9 KB
10 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/play_100x100.png
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/nanoWidget/104070/module/streamFeed.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.69.225 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-69-225.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
bbcd8c21e24392c2c8ef2c5df39578e95b2bff035be4930cbc53b996087783a6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:42 GMT
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"25a69b3019e3b959aef033482762080f:1572966031"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
9422
get
mv.outbrain.com/Multivac/api/
39 KB
11 KB
Script
General
Full URL
https://mv.outbrain.com/Multivac/api/get?url=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html&settings=true&recs=true&widgetJSId=AR_1&key=NANOWDGT01&version=104070&apv=true&sig=WcDMITOl&format=html&rand=31987&lsd=be69e2e2-d8dc-451d-a71a-27f02759a30d&lsdt=1573026222360&pdobuid=-1&osLang=en-US&va=true&cmpStat=1&scrW=1600&scrH=1200&t=NDJhYjdmNzkwMDA3MmVkZGIzOTBlMzI0MjU2YWU1ZWY=&winW=1600&winH=1200&adblck=false&secured=true&feedIdx=0&lastIdx=0&lastCardIdx=0&fAB=no_abtest
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/nanoWidget/104070/module/streamFeed.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.2 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
9df70f50df8800c44e932f76e8df8b2c0ac083dd1d3cb5c2e7f4116146377f50

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:43 GMT
content-encoding
gzip
traffic-path
NYDC1, JFK, HHN, Europe1
x-cache
MISS, MISS
p3p
policyref="http://www.outbrain.com/w3c/p3p.xml",CP="NOI NID CURa DEVa TAIa PSAa PSDa OUR IND UNI"
status
200
x-cache-hits
0, 0
x-traceid
77bb323921826e75afc3f84fb3eb6d8
content-length
10262
x-served-by
cache-jfk8120-JFK, cache-hhn4069-HHN
pragma
no-cache
x-timer
S1573026223.720856,VS0,VE315
vary
Accept-Encoding, User-Agent
content-type
application/json; charset=UTF-8
via
1.1 varnish, 1.1 varnish
cache-control
no-cache
backend-ip
104.156.90.20
accept-ranges
bytes, bytes
expires
Thu, 01 Jan 1970 00:00:00 GMT
obp.min.css
libs.sphere.com/video/outbrain-player/current/
1 KB
1 KB
Stylesheet
General
Full URL
https://libs.sphere.com/video/outbrain-player/current/obp.min.css
Requested by
Host: libs.sphere.com
URL: https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.250 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-250.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
1185ac7ee0922936a46115cf79bf1d9d704792bef6dc6dccf96215d874e9f706

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:42 GMT
Content-Encoding
gzip
Connection
keep-alive
Content-Length
470
Pragma
no-cache
Last-Modified
Wed, 30 Oct 2019 07:59:12 GMT
Server
Apache
ETag
"6990dba1bfaa593cddc30001b4d27ad4:1572422352"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
text/css
Access-Control-Allow-Origin
*
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Wed, 06 Nov 2019 07:43:42 GMT
getDocFeatures
videoclientsservicescalls.outbrain.com/
275 B
508 B
Script
General
Full URL
https://videoclientsservicescalls.outbrain.com/getDocFeatures?docId=2486948652&pubId=28423&callback=OB_VidgetServiceCallBack0
Requested by
Host: libs.outbrain.com
URL: https://libs.outbrain.com/vidget/vidget.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.127 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
4cbc788788aa6e130df3ebde14ec8c2859c34a14a59a9e07e6fca8198b701820

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:43 GMT
Content-Encoding
gzip
Connection
close
ETag
W/"113-nr4AnEkdqdjUGALNY2jLuiCerFE"
Transfer-Encoding
chunked
Content-Type
text/html; charset=utf-8
r
trk.connatix.com/ Frame 64AB
0
162 B
Image
General
Full URL
https://trk.connatix.com/r?connatix_sess=yt1sW9PaoTa1iDNcmAmJLMteUAWuFRAWjMs4j5fGhoWcKs7XpV38WG7ZaHKEDLPEbJTqcx8vEnsLMdEObzhj9OVPze2QZ2J9nZAf5XHgChC2wGTSQSSDS1Zvec-CLAtvjKeqdggkUA-8wgTEv0438JKC02-LPHgtF40UCkFgZRLsnRs4qJmeXSr7jOzOk4XM&videoID=934153&c_pl=T-Sy4Ppo3Gf5iFXWWaHMuzV87Qw7JNQfUjX9LarBKtM5sgMRrgpkRTbEb9Oa84IDJwjmP8FfVKKqDuN9LuI2zEF_FMdKILntwpye_AjgsoHZvX4gBu3bsXx-Fp1PDpjHqkmpVrHGlieh02DW-SNKNrYlbv_HXNWXzPtIZKJlbbS8xryhCQUfyuFvwaA01pDdftdgv3_SHiZ4Yk8uCmv7Pu0ZA5qnnj2GoK3A3GBnJj4&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&c_v=1784_0_0_0_1&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.54.204.2 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-54-204-2.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:43 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
bridge3.348.2_en.html
imasdk.googleapis.com/js/core/ Frame 56FD
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.348.2_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.348.2_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
194814
date
Tue, 05 Nov 2019 04:10:14 GMT
expires
Wed, 04 Nov 2020 04:10:14 GMT
last-modified
Tue, 05 Nov 2019 04:05:57 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
99208
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
client.js
s0.2mdn.net/instream/video/ Frame 64AB
26 KB
11 KB
Script
General
Full URL
https://s0.2mdn.net/instream/video/client.js
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:820::2006 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
62f2eeec7851ae0d5e322062cf40092478236d4a4fc5a2cfd87b257739104147
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Wed, 06 Nov 2019 07:43:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=900
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
10523
x-xss-protection
0
expires
Wed, 06 Nov 2019 07:43:42 GMT
integrator.js
adservice.google.com/adsid/ Frame 64AB
109 B
174 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=www.computerworld.com
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

timing-allow-origin
*
date
Wed, 06 Nov 2019 07:43:42 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43",h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
104
x-xss-protection
0
vwt
trk.connatix.com/ Frame 64AB
0
162 B
Image
General
Full URL
https://trk.connatix.com/vwt?connatix_sess=yt1sW9PaoTa1iDNcmAmJLMteUAWuFRAWjMs4j5fGhoWcKs7XpV38WG7ZaHKEDLPEbJTqcx8vEnsLMdEObzhj9OVPze2QZ2J9nZAf5XHgChC2wGTSQSSDS1Zvec-CLAtvjKeqdggkUA-8wgTEv0438JKC02-LPHgtF40UCkFgZRLsnRs4qJmeXSr7jOzOk4XM&c_vid=934153&c_pl=T-Sy4Ppo3Gf5iFXWWaHMuzV87Qw7JNQfUjX9LarBKtM5sgMRrgpkRTbEb9Oa84IDJwjmP8FfVKKqDuN9LuI2zEF_FMdKILntwpye_AjgsoHZvX4gBu3bsXx-Fp1PDpjHqkmpVrHGlieh02DW-SNKNrYlbv_HXNWXzPtIZKJlbbS8xryhCQUfyuFvwaA01pDdftdgv3_SHiZ4Yk8uCmv7Pu0ZA5qnnj2GoK3A3GBnJj4&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&c_v=1784_0_0_0_1&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.54.204.2 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-54-204-2.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:43 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
1_360_1.mp4
v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/
448 KB
0
Media
General
Full URL
https://v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/1_360_1.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Range
bytes=0-

Response headers

x-amz-version-id
1YaqZC7.gjT3DeqS5u_Mw8fNPN8xlWes
via
1.1 varnish, 1.1 varnish
etag
"cc1120ad618b42d4141faea4ef590f1b"
age
86488
x-cache
HIT, HIT
status
206
content-length
12587798
x-served-by
cache-sjc3120-SJC, cache-hhn4063-HHN
content-range
bytes 0-12587797/12587798
last-modified
Tue, 05 Nov 2019 07:34:05 GMT
x-timer
S1573026223.962177,VS0,VE0
date
Wed, 06 Nov 2019 07:43:42 GMT
content-type
video/mp4
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes, bytes
x-cache-hits
0, 0
1_0.vtt
v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/
4 KB
5 KB
TextTrack
General
Full URL
https://v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/1_0.vtt
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
df8e16634ce4c5757a7a8d4f9abb7401ee1a27856b5e1c12ed9116294996d870

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Origin
https://www.computerworld.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-amz-version-id
IM0J3rnA_zfvCu.tuivjguYKy8.R1oFc
via
1.1 varnish, 1.1 varnish
etag
"5d08431280c46e8e5c33409b7069fcf8"
age
67124
x-cache
HIT, HIT
status
200
content-length
4444
x-served-by
cache-sjc3121-SJC, cache-hhn4063-HHN
last-modified
Tue, 05 Nov 2019 07:31:38 GMT
x-timer
S1573026223.962283,VS0,VE0
date
Wed, 06 Nov 2019 07:43:42 GMT
content-type
application/octet-stream
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes
x-cache-hits
1, 1
bridge3.348.2_en.html
imasdk.googleapis.com/js/core/ Frame B29C
0
0
Document
General
Full URL
https://imasdk.googleapis.com/js/core/bridge3.348.2_en.html
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
imasdk.googleapis.com
:scheme
https
:path
/js/core/bridge3.348.2_en.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
194814
date
Tue, 05 Nov 2019 04:10:14 GMT
expires
Wed, 04 Nov 2020 04:10:14 GMT
last-modified
Tue, 05 Nov 2019 04:05:57 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
99208
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
vwt
trk.connatix.com/ Frame 64AB
0
162 B
Image
General
Full URL
https://trk.connatix.com/vwt?c_pl=T-Sy4Ppo3Gf5iFXWWaHMuzV87Qw7JNQfUjX9LarBKtM5sgMRrgpkRTbEb9Oa84IDJwjmP8FfVKKqDuN9LuI2zEF_FMdKILntwpye_AjgsoHZvX4gBu3bsXx-Fp1PDpjHqkmpVrHGlieh02DW-SNKNrYlbv_HXNWXzPtIZKJlbbS8xryhCQUfyuFvwaA01pDdftdgv3_SHiZ4Yk8uCmv7Pu0ZA5qnnj2GoK3A3GBnJj4&id_cl=58eae67562b7422b12641573026222981&c_vid=934153&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&c_v=1784_0_0_0_1&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.54.204.2 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-54-204-2.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:43 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
l
mcdp-nydc1.outbrain.com/
4 B
377 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=405be9379f1a78127e1f32b55e3388ad_28423_1573026222814&tm=1459&eT=0&widgetWidth=970&widgetHeight=307&widgetX=315&widgetY=5574&wRV=104070&pVis=0&lsd=be69e2e2-d8dc-451d-a71a-27f02759a30d&eIdx=&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573026220578
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.31 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:43 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
c87151648a50dd6953d45e67ca50bda2
Content-Length
30
l
mcdp-nydc1.outbrain.com/
4 B
377 B
XHR
General
Full URL
https://mcdp-nydc1.outbrain.com/l?token=b20a57ee56d7593f1cc472d428a58aea_28423_1573026222982&tm=1463&eT=0&widgetWidth=970&widgetHeight=406&widgetX=315&widgetY=5901&wRV=104070&pVis=1&lsd=be69e2e2-d8dc-451d-a71a-27f02759a30d&eIdx=&ab=0&wl=0
Requested by
Host: widgets.outbrain.com
URL: https://widgets.outbrain.com/outbrain.js?_=1573026220578
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.31 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
c48b5b1a9776c84602de2306d7903a7241158a5077e7a8519af75c33441b8334
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:43 GMT
content-encoding
gzip
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Type
application/json; charset=UTF-8
access-control-allow-origin
*
access-control-expose-headers
content-range
Connection
close
X-TraceId
9d790b07f737edc4e0adbe8710875ebe
Content-Length
30
eyJpdSI6IjZhMWY1Yjg3ZGJmNDRkZGNlZmIyZDkyYTA2MzkxODJmYTM5Njg2MjVhYWNiNzUxYzVjMGQ4NmY4NTk3OWQyOTIiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
33 KB
33 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjZhMWY1Yjg3ZGJmNDRkZGNlZmIyZDkyYTA2MzkxODJmYTM5Njg2MjVhYWNiNzUxYzVjMGQ4NmY4NTk3OWQyOTIiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.70.82 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-70-82.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
a3f1fc4081d090c8a74c8653ba2f3f1ff982c49bf866c1828aa0ddebb011386a
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Wed, 30 Oct 2019 22:51:34 GMT
Date
Wed, 06 Nov 2019 07:43:43 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=1972756
Connection
keep-alive
X-TraceId
e9253f0544ad4365de5155d52a5a1644
Timing-Allow-Origin
*
Content-Length
33442
eyJpdSI6ImFjZTQ1YjgzODBmZGYwM2UwNDhmYzlkZmIzMTc4YmJkMjNmOGYxZDVhNmMxYjRhMjY2ODhhNzc3NTk0ZDVkN2YiLCJ3Ijo0MCwiaCI6NDAsImQiOjIuMCwiY3MiOjAsImYiOjR9.webp
images.outbrainimg.com/transform/v3/
2 KB
2 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6ImFjZTQ1YjgzODBmZGYwM2UwNDhmYzlkZmIzMTc4YmJkMjNmOGYxZDVhNmMxYjRhMjY2ODhhNzc3NTk0ZDVkN2YiLCJ3Ijo0MCwiaCI6NDAsImQiOjIuMCwiY3MiOjAsImYiOjR9.webp
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.70.82 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-70-82.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
6048da54b34a251c1922ae08d28662079a9c75b0d09b5bab6de2e472af1a8c3b
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Sat, 19 Oct 2019 07:18:27 GMT
Date
Wed, 06 Nov 2019 07:43:43 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2422623
Connection
keep-alive
X-TraceId
6e128ea07ae80c01bcecc5ad34136414
Timing-Allow-Origin
*
Content-Length
2074
eyJpdSI6IjI1MGNiNjk0NTk4MDRiOGM3MzBlMzlmZTJhYmEwYmVkODI1NzI2MDJhOTAyNjlhNzg1MTVmMjBmOTRkMTM2NjciLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
53 KB
53 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjI1MGNiNjk0NTk4MDRiOGM3MzBlMzlmZTJhYmEwYmVkODI1NzI2MDJhOTAyNjlhNzg1MTVmMjBmOTRkMTM2NjciLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.70.82 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-70-82.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
48627be87feb146c2dd56dc5345a7c0c30e133307bc4b05847a268e4c6c9368c
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Mon, 14 Oct 2019 14:34:38 GMT
Date
Wed, 06 Nov 2019 07:43:43 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=507022
Connection
keep-alive
X-TraceId
fdb09df4badce068c236af0e793edff8
Timing-Allow-Origin
*
Content-Length
53895
eyJpdSI6IjZmY2M2NDkyNDUzYzFkODhkNTU2MjI5NTYwOWQzOWI0MjZhYTNlYjQ1NzcwMDljZjMyYTFmZDQ1YTFlZjNiZjkiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
44 KB
44 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjZmY2M2NDkyNDUzYzFkODhkNTU2MjI5NTYwOWQzOWI0MjZhYTNlYjQ1NzcwMDljZjMyYTFmZDQ1YTFlZjNiZjkiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.70.82 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-70-82.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
3a15a6bf78249a95e8f7ea8dba81e789fce61c22f54fa42f519621c879678916
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Wed, 16 Oct 2019 08:50:53 GMT
Date
Wed, 06 Nov 2019 07:43:43 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2122065
Connection
keep-alive
X-TraceId
81369aaa407a7ed85c634134a3f7411a
Timing-Allow-Origin
*
Content-Length
44896
eyJpdSI6IjdmNGNhYzllNjdkNmJiZmMxMzBjYTY2OTljNjYyMzRjMGUwOTZhZjUyNTJhYTk4OGRhZDUzZjU1N2QwZmM1NjQiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
83 KB
84 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjdmNGNhYzllNjdkNmJiZmMxMzBjYTY2OTljNjYyMzRjMGUwOTZhZjUyNTJhYTk4OGRhZDUzZjU1N2QwZmM1NjQiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.70.82 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-70-82.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
e17b21aaf9349b536e7f52789ba10e3d3ba007012a69d84874557a997d3b24a1
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Wed, 23 Oct 2019 16:25:53 GMT
Date
Wed, 06 Nov 2019 07:43:43 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2303227
Connection
keep-alive
X-TraceId
bf188d515f62fbb7a1f84338298fbe62
Timing-Allow-Origin
*
Content-Length
85311
eyJpdSI6IjNjZDY0NGFiNDYxNWI3MTU0MGUwMjZiNjA3YTZmY2MxYmUzYTU5NTRiNDc0YThiNjZjMjM1OTQwMTYxYzhlZjIiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
images.outbrainimg.com/transform/v3/
61 KB
61 KB
Image
General
Full URL
https://images.outbrainimg.com/transform/v3/eyJpdSI6IjNjZDY0NGFiNDYxNWI3MTU0MGUwMjZiNjA3YTZmY2MxYmUzYTU5NTRiNDc0YThiNjZjMjM1OTQwMTYxYzhlZjIiLCJ3Ijo0MDAsImgiOjMwMCwiZCI6MS41LCJjcyI6MCwiZiI6NH0.webp
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.70.82 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-70-82.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
5fd4121ef1adff5574f4e0f8f87591e2043ab769fe91885929c24b1c0a6faf22
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Last-Modified
Thu, 31 Oct 2019 17:48:33 GMT
Date
Wed, 06 Nov 2019 07:43:43 GMT
Vary
Accept-Encoding
Content-Type
image/webp
Cache-Control
max-age=2024381
Connection
keep-alive
X-TraceId
4fbb553a7d4ee8cc582d4251d59946f9
Timing-Allow-Origin
*
Content-Length
62191
obp-slide-center.css
libs.sphere.com/video/outbrain-player/current/
717 B
850 B
XHR
General
Full URL
https://libs.sphere.com/video/outbrain-player/current/obp-slide-center.css
Requested by
Host: libs.sphere.com
URL: https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.250 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-250.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
76f037243db426f4e0d4e74c809969c610b4cab9555c2e14a4472a9f2c449366

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:43 GMT
Content-Encoding
gzip
Connection
keep-alive
Content-Length
264
Pragma
no-cache
Last-Modified
Wed, 30 Oct 2019 08:00:14 GMT
Server
Apache
ETag
"73ca457e68e30047fdef6d92886f8b71:1572422414"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
text/css
Access-Control-Allow-Origin
https://www.computerworld.com
Cache-Control
max-age=0, no-cache, no-store
Access-Control-Allow-Credentials
true
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Expires
Wed, 06 Nov 2019 07:43:43 GMT
p2
sb.scorecardresearch.com/ Frame 64AB
Redirect Chain
  • https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=1&ns_st_sp=1&ns...
  • https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=1&ns_st_sp=1&n...
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=1&ns_st_sp=1&ns_st_sc=1&ns_st_psq=1&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=play&ns_st_po=0&ns_st_cl=189000&ns_st_pb=1&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=0&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=0&ns_st_det=0&ns_st_upc=0&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=0&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=0&ns_st_dlpc=0&ns_st_lpa=0&ns_st_dlpa=0&ns_st_pa=0&ns_ts=1573026223244&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_lt=1&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=0&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 07:43:43 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=1&ns_st_sp=1&ns_st_sc=1&ns_st_psq=1&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=play&ns_st_po=0&ns_st_cl=189000&ns_st_pb=1&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=0&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=0&ns_st_det=0&ns_st_upc=0&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=0&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=0&ns_st_dlpc=0&ns_st_lpa=0&ns_st_dlpa=0&ns_st_pa=0&ns_ts=1573026223244&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_lt=1&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=0&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0
Pragma
no-cache
Date
Wed, 06 Nov 2019 07:43:43 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
getFocusExtraData
videoadextradata.outbrain.com/VideoAdExtraData/api/
25 B
234 B
Script
General
Full URL
https://videoadextradata.outbrain.com/VideoAdExtraData/api/getFocusExtraData?adId=139477402&callback=obpExtraDataCallback0
Requested by
Host: libs.sphere.com
URL: https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
70.42.32.95 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
d442840bdefe3895f27babba83b820c7788568379c220b98618b3cd443b64bfa

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:43 GMT
Connection
close
ETag
W/"19-zJz1yJA6zWbTgJszsxnNN601tkc"
Content-Length
25
Content-Type
text/html; charset=utf-8
ob_logo_67x12.png
widgets.outbrain.com/images/widgetIcons/
2 KB
3 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/ob_logo_67x12.png
Requested by
Host: libs.outbrain.com
URL: https://libs.outbrain.com/vidget/vidget.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.69.225 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-69-225.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
487aec7746a83542b3573383df65747e31c494d8412103b5675329f3d4befaeb

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:43 GMT
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"c52b07e749f7a09fa7b97b7e195e06ce:1572966016"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
2326
achoice.svg
widgets.outbrain.com/images/widgetIcons/
3 KB
2 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/achoice.svg
Requested by
Host: libs.outbrain.com
URL: https://libs.outbrain.com/vidget/vidget.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.69.225 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-69-225.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
2c87952cc1c23627496c7874271042bdb6af21efdf7cbf36ec4d98e6cec34d04

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:43 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"9d26fa4e7238ed94f1d0d92afb453b3e:1572966000"
Vary
Accept-Encoding
Access-Control-Allow-Methods
GET,POST
Content-Type
image/svg+xml
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
1368
vpt.js
static.vidazoo.com/basev/
38 KB
11 KB
Script
General
Full URL
https://static.vidazoo.com/basev/vpt.js
Requested by
Host: libs.outbrain.com
URL: https://libs.outbrain.com/vidget/vidget.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
70a054db0f1fa8a0b2398f9583f737b84a62f7b5704a1a94722d6e08f745bf3a

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:43 GMT
Content-Encoding
gzip
Last-Modified
Wed, 02 Oct 2019 09:36:14 GMT
ETag
"1570008974"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=43095
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
9872
X-HW
1573026223.dop054.fr8.shc,1573026223.dop054.fr8.t,1573026223.cds122.fr8.c
extend
bis.vidazoo.com/event/
0
438 B
XHR
General
Full URL
https://bis.vidazoo.com/event/extend
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/vpt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.225.101.71 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-3-225-101-71.compute-1.amazonaws.com
Software
Cowboy /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-type
application/json; charset=UTF-8

Response headers

Date
Wed, 06 Nov 2019 07:43:43 GMT
Via
1.1 vegur
Server
Cowboy
P3p
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Connection
keep-alive
Access-Control-Allow-Headers
Origin, DNT, X-Requested-With, Keep-Alive, Content-Type, Accept, Cache-Control, Pragma, Authorization, Content-Length, Accept-Encoding, Accept-Language
Content-Length
0
json
server.vidazoo.com/campaigns/5a9ea5a0225f7d0004c70045/5ae0a5c0da5fdd00042f78f5/
53 KB
22 KB
XHR
General
Full URL
https://server.vidazoo.com/campaigns/5a9ea5a0225f7d0004c70045/5ae0a5c0da5fdd00042f78f5/json
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/vpt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.203.78.22 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-203-78-22.compute-1.amazonaws.com
Software
Cowboy /
Resource Hash
698d56a5421e9153b2ec4614f5fd1340bfac3c0ee376405d5759c78614ac30fe

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-type
application/json; charset=UTF-8

Response headers

Date
Wed, 06 Nov 2019 07:43:43 GMT
Content-Encoding
gzip
Server
Cowboy
Content-Type
application/json; charset=utf-8
Access-Control-Allow-Origin
https://www.computerworld.com
Cache-Control
max-age=0, no-cache, must-revalidate, proxy-revalidate
Access-Control-Allow-Credentials
true
Connection
keep-alive
Access-Control-Allow-Headers
Origin, X-Requested-With, Content-Type, Accept, Authorization, Content-Range, Cache-Control
Content-Length
22461
Via
1.1 vegur
csi
csi.gstatic.com/ Frame 64AB
0
57 B
Other
General
Full URL
https://csi.gstatic.com/csi?v=2&s=ima&dmc=8&puid=1~k2mz75jo&c=6813019524885&slotId=3406509762442.5&eee=missing-element&bi=missing-id
Requested by
Host: imasdk.googleapis.com
URL: https://imasdk.googleapis.com/js/sdkloader/ima3.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2607:f8b0:4001:c03::5e , United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain;charset=UTF-8

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 07:43:43 GMT
last-modified
Wed, 21 Jan 2004 19:51:30 GMT
server
Golfe2
status
204
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="46,43",h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
content-length
0
expires
Fri, 01 Jan 1990 00:00:00 GMT
videoplayback
r12---sn-4g5ednzz.googlevideo.com/
Redirect Chain
  • https://r5---sn-4g5ednsl.googlevideo.com/videoplayback?id=66be5dfe4c3b00c5&itag=22&source=youtube&requiressl=yes&mm=31&mn=sn-4g5ednsl&ms=au&mv=m&mvi=4&pl=22&ei=r3nCXZDHDI_C-gbFnIDgCw&susc=gvp&acao=...
  • https://r12---sn-4g5ednzz.googlevideo.com/videoplayback?id=66be5dfe4c3b00c5&itag=22&source=youtube&requiressl=yes&mvi=11&pl=41&ei=r3nCXZDHDI_C-gbFnIDgCw&susc=gvp&acao=yes&mime=video%2Fmp4&dur=6.060...
724 KB
724 KB
Media
General
Full URL
https://r12---sn-4g5ednzz.googlevideo.com/videoplayback?id=66be5dfe4c3b00c5&itag=22&source=youtube&requiressl=yes&mvi=11&pl=41&ei=r3nCXZDHDI_C-gbFnIDgCw&susc=gvp&acao=yes&mime=video%2Fmp4&dur=6.060&lmt=1570783928593160&txp=2216222&ip=144.76.109.30&ipbits=0&expire=1573055023&sparams=acao,dur,ei,expire,id,ip,ipbits,itag,lmt,mime,mip,mm,mn,ms,mv,mvi,pl,requiressl,source,susc&signature=386B4170A10B562B26289B32721FF16C6FC5827F.0FCDCCC546470FFC43AC0795F6C7FAC4806B10B4&key=cms1&cpn=_O5QpwjS3gVlVVNu&redirect_counter=1&he=yes&rm=sn-4g5e6z76&fexp=23812955&req_id=619e512e257e36e2&cms_redirect=yes&mip=2a01:4f8:192:5414::2&mm=43&mn=sn-4g5ednzz&ms=onl&mt=1573026070&mv=m
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:9::c Frankfurt am Main, Germany, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
gvs 1.0 /
Resource Hash
0679f77a8d442d84579668baa7d4f6cf45ee4e62afedb7448b2c191b0a865c97
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:43 GMT
X-Content-Type-Options
nosniff
Last-Modified
Fri, 11 Oct 2019 08:52:08 GMT
Server
gvs 1.0
Content-Type
video/mp4
Content-Range
bytes 0-741307/741308
Cache-Control
private, max-age=28500
Connection
close
Accept-Ranges
bytes
Alt-Svc
quic=":443"; ma=2592000; v="46,43",h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
Content-Length
741308
Expires
Wed, 06 Nov 2019 07:43:43 GMT

Redirect headers

Date
Wed, 06 Nov 2019 07:43:43 GMT
X-Content-Type-Options
nosniff
Last-Modified
Wed, 02 May 2007 10:26:10 GMT
Server
gvs 1.0
Content-Type
text/html
Location
https://r12---sn-4g5ednzz.googlevideo.com/videoplayback?id=66be5dfe4c3b00c5&itag=22&source=youtube&requiressl=yes&mvi=11&pl=41&ei=r3nCXZDHDI_C-gbFnIDgCw&susc=gvp&acao=yes&mime=video%2Fmp4&dur=6.060&lmt=1570783928593160&txp=2216222&ip=144.76.109.30&ipbits=0&expire=1573055023&sparams=acao,dur,ei,expire,id,ip,ipbits,itag,lmt,mime,mip,mm,mn,ms,mv,mvi,pl,requiressl,source,susc&signature=386B4170A10B562B26289B32721FF16C6FC5827F.0FCDCCC546470FFC43AC0795F6C7FAC4806B10B4&key=cms1&cpn=_O5QpwjS3gVlVVNu&redirect_counter=1&he=yes&rm=sn-4g5e6z76&fexp=23812955&req_id=619e512e257e36e2&cms_redirect=yes&mip=2a01:4f8:192:5414::2&mm=43&mn=sn-4g5ednzz&ms=onl&mt=1573026070&mv=m
Cache-Control
private, max-age=900
Connection
close
Content-Length
0
Expires
Wed, 06 Nov 2019 07:43:43 GMT
truncated
/
175 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
67ea46bc3d15351067faccb3613bd833dd3f15137a4b4a09f2e873fd41d024d2

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Type
image/png
p
sb.scorecardresearch.com/ Frame 64AB
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=2&ns_st_sp=1&ns_st_sc=1&ns_st_psq=1&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=pause&ns_st_po=263&ns_st_cl=189000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=263&ns_st_dpt=263&ns_st_ipt=263&ns_st_et=263&ns_st_det=263&ns_st_upc=263&ns_st_dupc=263&ns_st_iupc=263&ns_st_upa=263&ns_st_dupa=263&ns_st_iupa=263&ns_st_lpc=263&ns_st_dlpc=263&ns_st_lpa=263&ns_st_dlpa=263&ns_st_pa=263&ns_ts=1573026223507&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=1&ns_st_pp=1&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 07:43:43 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 01 Jan 1990 00:00:00 GMT
p
sb.scorecardresearch.com/ Frame 64AB
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=3&ns_st_sp=1&ns_st_sc=1&ns_st_psq=1&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=1&ns_st_ev=end&ns_st_po=263&ns_st_cl=189000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=263&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=264&ns_st_det=1&ns_st_upc=263&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=263&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=263&ns_st_dlpc=0&ns_st_lpa=263&ns_st_dlpa=0&ns_st_pa=263&ns_ts=1573026223508&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=0&ns_st_pp=1&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 07:43:43 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 01 Jan 1990 00:00:00 GMT
p
sb.scorecardresearch.com/ Frame 64AB
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=4&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=play&ns_st_po=0&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=0&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=0&ns_st_det=0&ns_st_upc=0&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=0&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=0&ns_st_dlpc=0&ns_st_lpa=0&ns_st_dlpa=0&ns_st_pa=263&ns_ts=1573026223509&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=1&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 07:43:43 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 01 Jan 1990 00:00:00 GMT
impression
trk.connatix.com/
338 B
492 B
Script
General
Full URL
https://trk.connatix.com/impression?c_aid=13455&c_mt=ima&connatix_sess=yt1sW9PaoTa1iDNcmAmJLMteUAWuFRAWjMs4j5fGhoWcKs7XpV38WG7ZaHKEDLPEbJTqcx8vEnsLMdEObzhj9OVPze2QZ2J9nZAf5XHgChC2wGTSQSSDS1Zvec-CLAtvjKeqdggkUA-8wgTEv0438JKC02-LPHgtF40UCkFgZRLsnRs4qJmeXSr7jOzOk4XM&c_ph=225&c_pw=400&c_vid=934153&c_wt=548&c_wc=2&c_rc=2&c_tad=1&c_adp=0&c_pl=T-Sy4Ppo3Gf5iFXWWaHMuzV87Qw7JNQfUjX9LarBKtM5sgMRrgpkRTbEb9Oa84IDJwjmP8FfVKKqDuN9LuI2zEF_FMdKILntwpye_AjgsoHZvX4gBu3bsXx-Fp1PDpjHqkmpVrHGlieh02DW-SNKNrYlbv_HXNWXzPtIZKJlbbS8xryhCQUfyuFvwaA01pDdftdgv3_SHiZ4Yk8uCmv7Pu0ZA5qnnj2GoK3A3GBnJj4&id_cl=58eae67562b7422b12641573026222981&id_va=a94bbfebfdc286c871051573026223524&c_v=1784_0_0_0_1&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&spp=1&xplt=true&callback=cnxJSONP_fe9957c903d3fc4c70861573026223524
Requested by
Host: cdns.connatix.com
URL: https://cdns.connatix.com/p/1784/min/connatix.renderer.infeed.min_dc.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.54.204.2 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-54-204-2.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
94e2bff77caaef1f82dc030a4783829d7dc70ab43c0cac72adddf079c24f9464

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:43 GMT
Content-Encoding
gzip
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
304
gePublisherName
videoclientsservicescalls.outbrain.com/
40 B
249 B
Script
General
Full URL
https://videoclientsservicescalls.outbrain.com/gePublisherName?pubId=28423&callback=OB_CtwClientCalls
Requested by
Host: libs.sphere.com
URL: https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
64.202.112.127 , United States, ASN22075 (AS-OUTBRAIN - Outbrain, Inc., US),
Reverse DNS
ny.outbrain.com
Software
/
Resource Hash
3ca37abbf9299e4b5a886bb7ca2782851a515c4c1cc670cd4c8ac4a59bf3aa5e

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:43 GMT
Connection
close
ETag
W/"28-T5RgnpJKjz4Ap6e8Kk/EFWed5Y0"
Content-Length
40
Content-Type
text/html; charset=utf-8
vwt
trk.connatix.com/ Frame 64AB
0
162 B
Image
General
Full URL
https://trk.connatix.com/vwt?c_pl=T-Sy4Ppo3Gf5iFXWWaHMuzV87Qw7JNQfUjX9LarBKtM5sgMRrgpkRTbEb9Oa84IDJwjmP8FfVKKqDuN9LuI2zEF_FMdKILntwpye_AjgsoHZvX4gBu3bsXx-Fp1PDpjHqkmpVrHGlieh02DW-SNKNrYlbv_HXNWXzPtIZKJlbbS8xryhCQUfyuFvwaA01pDdftdgv3_SHiZ4Yk8uCmv7Pu0ZA5qnnj2GoK3A3GBnJj4&id_cl=58eae67562b7422b12641573026222981&id_va=a94bbfebfdc286c871051573026223524&c_v=1784_0_0_0_1&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.54.204.2 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-54-204-2.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:43 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
loader.gif
libs.sphere.com/video/outbrain-player/assets/
51 KB
51 KB
Image
General
Full URL
https://libs.sphere.com/video/outbrain-player/assets/loader.gif
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
184.31.90.250 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a184-31-90-250.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
d05d164843ec0e47ddf7fca61f0e4bed73c23280c7eeb0fd0e9dc0c618b8eb90

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:43 GMT
Last-Modified
Sun, 17 Dec 2017 09:28:08 GMT
Server
Apache
ETag
"c753233e9ae7214419baca2aedd1c4b9:1513502888"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/gif
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
true
Connection
keep-alive
Accept-Ranges
bytes
Access-Control-Allow-Headers
*
Content-Length
52226
frame
vastcdn.outbrain.com/ Frame F8DD
0
0
Document
General
Full URL
https://vastcdn.outbrain.com/frame?h=https%3A%2F%2Fwww.computerworld.com&id=ob3abf80-9162-d936-20c2-7f32158416c2&url=https%3A%2F%2Frtr.innovid.com%2Fr1.5d259b75d6a577.80095753%3FobOrigUrl%3Dtrue
Requested by
Host: libs.sphere.com
URL: https://libs.sphere.com/video/outbrain-player/current/obp.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a02:26f0:10c:381::2a83 , Ascension Island, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
Software
/
Resource Hash
Security Headers
Name Value
Strict-Transport-Security max-age=0; includeSubDomains;

Request headers

Host
vastcdn.outbrain.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Accept-Encoding
gzip, deflate, br
Cookie
recs_66d352a46e2abe4affc72602ae4978bd=2B1612183939A2472335784ACD0; obuid=be69e2e2-d8dc-451d-a71a-27f02759a30d
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622

Response headers

Content-Type
text/html; charset=utf-8
ETag
W/"10ff-EKDAzViREYP9ss+PJV9EvDtEXDc"
Strict-Transport-Security
max-age=0; includeSubDomains;
Content-Encoding
gzip
Content-Length
1430
Vary
Accept-Encoding
Cache-Control
max-age=3600
Expires
Wed, 06 Nov 2019 08:43:43 GMT
Date
Wed, 06 Nov 2019 07:43:43 GMT
Connection
keep-alive
sbt.js
static.vidazoo.com/basev/1.0.318/
520 KB
116 KB
Script
General
Full URL
https://static.vidazoo.com/basev/1.0.318/sbt.js
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/vpt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
49ba60514d84fa0a60e032fca86466b915430eb4ed84984f2fe9190ea731af7d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:44 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 17:44:50 GMT
ETag
"1572975890"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=36078
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
118284
X-HW
1573026223.dop054.fr8.shc,1573026224.dop054.fr8.t,1573026224.cds018.fr8.c
8293ddd8-072b-44cf-aacb-16a2c4bd78c0
https://www.computerworld.com/
1 KB
0
Other
General
Full URL
blob:https://www.computerworld.com/8293ddd8-072b-44cf-aacb-16a2c4bd78c0
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ee441245ef85f538030acf5e534d1cf2664c18289cec8cc0d84656ffb0e0a95d

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Length
1205
5a007a15-cb61-4c40-a16d-1e47c34b858e
https://www.computerworld.com/
1 KB
0
Other
General
Full URL
blob:https://www.computerworld.com/5a007a15-cb61-4c40-a16d-1e47c34b858e
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8e920612ce29a3290fc2edbaab7647470f21dda35cc1a350f9b8b362fc4d3ebe

Request headers

Sec-Fetch-Mode
same-origin
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Content-Length
1515
outbrain.js
static.vidazoo.com/basev/skins/outbrain/
65 KB
19 KB
Script
General
Full URL
https://static.vidazoo.com/basev/skins/outbrain/outbrain.js
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
fed94ed7a6761a28c636099bc32eb47cc0ac48bae44f7cf99604b839c1ff1fab

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:44 GMT
Content-Encoding
gzip
Last-Modified
Wed, 04 Sep 2019 17:00:59 GMT
ETag
"1567616459"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=22157
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
18975
X-HW
1573026223.dop054.fr8.shc,1573026224.dop054.fr8.t,1573026224.cds018.fr8.c
truncated
/
2 KB
2 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c27b11a4844614f6d6e987fa8f18ff24e12f59abe2972869509f57f92bdac135

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Origin
https://www.computerworld.com

Response headers

Content-Type
application/x-font-ttf;charset=utf-8
prebid.js
static.vidazoo.com/basev/prebid/ Frame 63BB
250 KB
80 KB
Script
General
Full URL
https://static.vidazoo.com/basev/prebid/prebid.js
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
d9d09c199ddc98c21c53d0a8ae899f01a24edb120d295c124cca6f096500d982

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:44 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 10:56:10 GMT
ETag
"1572951370"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=22157
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
80772
X-HW
1573026223.dop054.fr8.shc,1573026224.dop054.fr8.t,1573026224.cds018.fr8.c
5a9fcd5bfe8d0f00047aaceb.mp4
inventory.vidazoo.com/5a9ea5a0225f7d0004c70045/5a9fcd5bfe8d0f00047aaceb/
6 KB
7 KB
Media
General
Full URL
https://inventory.vidazoo.com/5a9ea5a0225f7d0004c70045/5a9fcd5bfe8d0f00047aaceb/5a9fcd5bfe8d0f00047aaceb.mp4
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
dbeb404d326e6051a0182a90d654ea370f8c1ed0684f523c1f722447787d56d6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Range
bytes=0-

Response headers

Date
Wed, 06 Nov 2019 07:43:44 GMT
Content-Range
bytes 0-5955/5956
Last-Modified
Wed, 07 Mar 2018 11:30:44 GMT
ETag
"1520422244"
X-HW
1573026224.dop011.fr8.shc,1573026224.dop011.fr8.t,1573026224.cds120.fr8.c
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
public, max-age=86400
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
video/mp4
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
5956
play_100x100.png
widgets.outbrain.com/images/widgetIcons/
9 KB
10 KB
Image
General
Full URL
https://widgets.outbrain.com/images/widgetIcons/play_100x100.png
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.69.225 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-69-225.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
bbcd8c21e24392c2c8ef2c5df39578e95b2bff035be4930cbc53b996087783a6

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:44 GMT
Last-Modified
Tue, 05 Nov 2019 14:34:48 GMT
Server
Apache
ETag
"25a69b3019e3b959aef033482762080f:1572966031"
Access-Control-Allow-Methods
GET,POST
Content-Type
image/png
Access-Control-Allow-Origin
*
Cache-Control
max-age=604800
Access-Control-Allow-Credentials
false
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
9422
tracking.png
trk.connatix.com/ Frame 64AB
0
162 B
Image
General
Full URL
https://trk.connatix.com/tracking.png?connatix_sess=U3ijqXzHPpIk55RCNaGZ6BiFV2rtnQJieN6W8ojhO1diibtgJjdv3PGvyHtpA92hSalFAJTHfLfL86Tq_EI7Ca1h8M6HyQ6utgcuQtA9MtSj7MIW3E7L4PXING0VB5JemauKfFRC4T8GhigeV5ICBFtLjhwp17oAxHfuKD7_jGT0ydB0WM7eb02Udwj6aIrS&c_aid=13455&c_vid=934153&cb=68e72478b2af232e22ed1573026225222&quartile=1&c_v=1784_0_0_0_1&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.54.204.2 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-54-204-2.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:45 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
qt
trk.connatix.com/ Frame 64AB
0
162 B
Image
General
Full URL
https://trk.connatix.com/qt?c_q=1&c_pl=T-Sy4Ppo3Gf5iFXWWaHMuzV87Qw7JNQfUjX9LarBKtM5sgMRrgpkRTbEb9Oa84IDJwjmP8FfVKKqDuN9LuI2zEF_FMdKILntwpye_AjgsoHZvX4gBu3bsXx-Fp1PDpjHqkmpVrHGlieh02DW-SNKNrYlbv_HXNWXzPtIZKJlbbS8xryhCQUfyuFvwaA01pDdftdgv3_SHiZ4Yk8uCmv7Pu0ZA5qnnj2GoK3A3GBnJj4&id_cl=58eae67562b7422b12641573026222981&id_va=a94bbfebfdc286c871051573026223524&c_v=1784_0_0_0_1&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.54.204.2 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-54-204-2.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:45 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
tracking.png
trk.connatix.com/ Frame 64AB
0
162 B
Image
General
Full URL
https://trk.connatix.com/tracking.png?c_rbid=[{id:13455,c_wt:401}]&cb=15aab3ba02783133033b1573026225623&c_pl=T-Sy4Ppo3Gf5iFXWWaHMuzV87Qw7JNQfUjX9LarBKtM5sgMRrgpkRTbEb9Oa84IDJwjmP8FfVKKqDuN9LuI2zEF_FMdKILntwpye_AjgsoHZvX4gBu3bsXx-Fp1PDpjHqkmpVrHGlieh02DW-SNKNrYlbv_HXNWXzPtIZKJlbbS8xryhCQUfyuFvwaA01pDdftdgv3_SHiZ4Yk8uCmv7Pu0ZA5qnnj2GoK3A3GBnJj4&id_cl=58eae67562b7422b12641573026222981&c_v=1784_0_0_0_1&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.54.204.2 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-54-204-2.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:45 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
tracking.png
trk.connatix.com/ Frame 64AB
0
162 B
Image
General
Full URL
https://trk.connatix.com/tracking.png?connatix_sess=U3ijqXzHPpIk55RCNaGZ6BiFV2rtnQJieN6W8ojhO1diibtgJjdv3PGvyHtpA92hSalFAJTHfLfL86Tq_EI7Ca1h8M6HyQ6utgcuQtA9MtSj7MIW3E7L4PXING0VB5JemauKfFRC4T8GhigeV5ICBFtLjhwp17oAxHfuKD7_jGT0ydB0WM7eb02Udwj6aIrS&c_aid=13455&c_vid=934153&cb=fc56c21a9ef7c6a7f14f1573026226722&quartile=2&c_v=1784_0_0_0_1&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.54.204.2 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-54-204-2.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:46 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
qt
trk.connatix.com/ Frame 64AB
0
162 B
Image
General
Full URL
https://trk.connatix.com/qt?c_q=2&c_pl=T-Sy4Ppo3Gf5iFXWWaHMuzV87Qw7JNQfUjX9LarBKtM5sgMRrgpkRTbEb9Oa84IDJwjmP8FfVKKqDuN9LuI2zEF_FMdKILntwpye_AjgsoHZvX4gBu3bsXx-Fp1PDpjHqkmpVrHGlieh02DW-SNKNrYlbv_HXNWXzPtIZKJlbbS8xryhCQUfyuFvwaA01pDdftdgv3_SHiZ4Yk8uCmv7Pu0ZA5qnnj2GoK3A3GBnJj4&id_cl=58eae67562b7422b12641573026222981&id_va=a94bbfebfdc286c871051573026223524&c_v=1784_0_0_0_1&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.54.204.2 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-54-204-2.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:46 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
tracking.png
trk.connatix.com/ Frame 64AB
0
162 B
Image
General
Full URL
https://trk.connatix.com/tracking.png?connatix_sess=U3ijqXzHPpIk55RCNaGZ6BiFV2rtnQJieN6W8ojhO1diibtgJjdv3PGvyHtpA92hSalFAJTHfLfL86Tq_EI7Ca1h8M6HyQ6utgcuQtA9MtSj7MIW3E7L4PXING0VB5JemauKfFRC4T8GhigeV5ICBFtLjhwp17oAxHfuKD7_jGT0ydB0WM7eb02Udwj6aIrS&c_aid=13455&c_vid=934153&cb=9ef1bf4d30edec81cd241573026228222&quartile=3&c_v=1784_0_0_0_1&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.54.204.2 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-54-204-2.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:48 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
qt
trk.connatix.com/ Frame 64AB
0
162 B
Image
General
Full URL
https://trk.connatix.com/qt?c_q=3&c_pl=T-Sy4Ppo3Gf5iFXWWaHMuzV87Qw7JNQfUjX9LarBKtM5sgMRrgpkRTbEb9Oa84IDJwjmP8FfVKKqDuN9LuI2zEF_FMdKILntwpye_AjgsoHZvX4gBu3bsXx-Fp1PDpjHqkmpVrHGlieh02DW-SNKNrYlbv_HXNWXzPtIZKJlbbS8xryhCQUfyuFvwaA01pDdftdgv3_SHiZ4Yk8uCmv7Pu0ZA5qnnj2GoK3A3GBnJj4&id_cl=58eae67562b7422b12641573026222981&id_va=a94bbfebfdc286c871051573026223524&c_v=1784_0_0_0_1&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.54.204.2 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-54-204-2.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:48 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
json
idg.blueconic.net/DG/DEFAULT/rest/rpc/
2 KB
2 KB
XHR
General
Full URL
https://idg.blueconic.net/DG/DEFAULT/rest/rpc/json?referer=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&bcsessionid=&bctempid=&overruleReferrer=&time=2019-11-06T08%3A43%3A48%2B01%3A00&ts=1573026228714
Requested by
Host: cdn.blueconic.net
URL: https://cdn.blueconic.net/idg.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.81.224.214 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-54-81-224-214.compute-1.amazonaws.com
Software
- /
Resource Hash
5dc1614fddf2a6d1b5adba6ac6c011c4dcea14a60494cdb47a63f19a0a43dc7d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

date
Wed, 06 Nov 2019 07:43:48 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-permitted-cross-domain-policies
master-only
p3p
policyref="", CP="DSP"
status
200
content-length
914
x-xss-protection
1; mode=block
pragma
no-cache
server
-
content-type
application/json; charset=utf-8
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache, no-store, no-transform, must-revalidate, private
access-control-allow-credentials
true
x-robots-tag
noindex, nofollow
expires
Thu, 01 Jan 1970 00:00:00 GMT
tracking.png
trk.connatix.com/ Frame 64AB
0
162 B
Image
General
Full URL
https://trk.connatix.com/tracking.png?connatix_sess=U3ijqXzHPpIk55RCNaGZ6BiFV2rtnQJieN6W8ojhO1diibtgJjdv3PGvyHtpA92hSalFAJTHfLfL86Tq_EI7Ca1h8M6HyQ6utgcuQtA9MtSj7MIW3E7L4PXING0VB5JemauKfFRC4T8GhigeV5ICBFtLjhwp17oAxHfuKD7_jGT0ydB0WM7eb02Udwj6aIrS&c_aid=13455&c_vid=934153&cb=e757dd7830a0c086ca6f1573026229641&quartile=4&c_v=1784_0_0_0_1&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.54.204.2 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-54-204-2.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:49 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
qt
trk.connatix.com/ Frame 64AB
0
162 B
Image
General
Full URL
https://trk.connatix.com/qt?c_q=4&c_pl=T-Sy4Ppo3Gf5iFXWWaHMuzV87Qw7JNQfUjX9LarBKtM5sgMRrgpkRTbEb9Oa84IDJwjmP8FfVKKqDuN9LuI2zEF_FMdKILntwpye_AjgsoHZvX4gBu3bsXx-Fp1PDpjHqkmpVrHGlieh02DW-SNKNrYlbv_HXNWXzPtIZKJlbbS8xryhCQUfyuFvwaA01pDdftdgv3_SHiZ4Yk8uCmv7Pu0ZA5qnnj2GoK3A3GBnJj4&id_cl=58eae67562b7422b12641573026222981&id_va=a94bbfebfdc286c871051573026223524&c_v=1784_0_0_0_1&p=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perf&xplt=true&spp=1
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.54.204.2 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-52-54-204-2.compute-1.amazonaws.com
Software
nginx/1.15.9 (Ubuntu) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Access-Control-Allow-Origin
*
Date
Wed, 06 Nov 2019 07:43:49 GMT
Server
nginx/1.15.9 (Ubuntu)
Connection
keep-alive
Content-Length
0
p2
sb.scorecardresearch.com/ Frame 64AB
Redirect Chain
  • https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=5&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_...
  • https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=5&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns...
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=5&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=pause&ns_st_po=6133&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=6133&ns_st_dpt=6133&ns_st_ipt=6133&ns_st_et=6133&ns_st_det=6133&ns_st_upc=6133&ns_st_dupc=6133&ns_st_iupc=6133&ns_st_upa=6133&ns_st_dupa=6133&ns_st_iupa=6133&ns_st_lpc=6133&ns_st_dlpc=6133&ns_st_lpa=6133&ns_st_dlpa=6133&ns_st_pa=6396&ns_ts=1573026229642&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=1&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 07:43:49 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=5&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=pause&ns_st_po=6133&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=6133&ns_st_dpt=6133&ns_st_ipt=6133&ns_st_et=6133&ns_st_det=6133&ns_st_upc=6133&ns_st_dupc=6133&ns_st_iupc=6133&ns_st_upa=6133&ns_st_dupa=6133&ns_st_iupa=6133&ns_st_lpc=6133&ns_st_dlpc=6133&ns_st_lpa=6133&ns_st_dlpa=6133&ns_st_pa=6396&ns_ts=1573026229642&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=1&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0
Pragma
no-cache
Date
Wed, 06 Nov 2019 07:43:49 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
p2
sb.scorecardresearch.com/ Frame 64AB
Redirect Chain
  • https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=6&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_...
  • https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=6&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns...
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=6&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=end&ns_st_po=6133&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=6133&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=6134&ns_st_det=1&ns_st_upc=6133&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=6133&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=6133&ns_st_dlpc=0&ns_st_lpa=6133&ns_st_dlpa=0&ns_st_pa=6396&ns_ts=1573026229643&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=0&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 07:43:49 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=6&ns_st_sp=1&ns_st_sc=1&ns_st_psq=2&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=1&ns_st_spc=1&ns_st_cn=2&ns_st_ev=end&ns_st_po=6133&ns_st_cl=15000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=1&ns_st_ad=1&ns_st_ci=0&ns_st_pt=6133&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=6134&ns_st_det=1&ns_st_upc=6133&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=6133&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=6133&ns_st_dlpc=0&ns_st_lpa=6133&ns_st_dlpa=0&ns_st_pa=6396&ns_ts=1573026229643&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=1&ns_st_dpc=0&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_an=1&ns_st_pr=*null&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=va12&ns_st_st=*null&ns_st_pu=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0
Pragma
no-cache
Date
Wed, 06 Nov 2019 07:43:49 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
p2
sb.scorecardresearch.com/ Frame 64AB
Redirect Chain
  • https://sb.scorecardresearch.com/p?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=7&ns_st_sp=1&ns...
  • https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=7&ns_st_sp=1&n...
43 B
309 B
Image
General
Full URL
https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=7&ns_st_sp=1&ns_st_sc=2&ns_st_psq=3&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=2&ns_st_spc=2&ns_st_cn=1&ns_st_ev=play&ns_st_po=0&ns_st_cl=189000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=0&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=0&ns_st_det=0&ns_st_upc=263&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=0&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=263&ns_st_dlpc=0&ns_st_lpa=0&ns_st_dlpa=0&ns_st_pa=6396&ns_ts=1573026229643&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
23.45.99.242 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a23-45-99-242.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
24e480e4659fbae818853a38f8a3036f529f539024dc3e772c0b594ce02ea9db

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 07:43:49 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Type
image/gif
Content-Length
43
Expires
Mon, 01 Jan 1990 00:00:00 GMT

Redirect headers

Location
https://sb.scorecardresearch.com/p2?c1=2&c2=17958079&ns_ap_an=ConnatixWeb&ns_ap_bi=*null&ns_type=hidden&ns_st_sv=6.1.1.171219&ns_st_smv=5.8&ns_st_it=r&ns_st_id=1573026223243&ns_st_ec=7&ns_st_sp=1&ns_st_sc=2&ns_st_psq=3&ns_st_asq=1&ns_st_sq=1&ns_st_ppc=1&ns_st_apc=2&ns_st_spc=2&ns_st_cn=1&ns_st_ev=play&ns_st_po=0&ns_st_cl=189000&ns_st_mp=js_api&ns_st_mv=6.1.1.171219&ns_st_pn=1&ns_st_tp=0&ns_st_ci=v_934153&ns_st_pt=0&ns_st_dpt=0&ns_st_ipt=0&ns_st_et=0&ns_st_det=0&ns_st_upc=263&ns_st_dupc=0&ns_st_iupc=0&ns_st_upa=0&ns_st_dupa=0&ns_st_iupa=0&ns_st_lpc=263&ns_st_dlpc=0&ns_st_lpa=0&ns_st_dlpa=0&ns_st_pa=6396&ns_ts=1573026229643&ns_st_bc=0&ns_st_dbc=0&ns_st_bt=0&ns_st_dbt=0&ns_st_bp=0&ns_st_skc=0&ns_st_dskc=0&ns_st_ska=0&ns_st_dska=0&ns_st_skd=0&ns_st_skt=0&ns_st_dskt=0&ns_st_pc=0&ns_st_dpc=0&ns_st_pp=2&ns_st_br=0&ns_st_rt=100&ns_st_ub=0&ns_st_ki=1200000&ns_st_pr=What%20is%20a%20botnet%3F%20When%20IoT%20devices%20attack&ns_st_sn=*null&ns_st_en=*null&ns_st_ep=*null&ns_st_ct=vc11&ns_st_ge=*null&ns_st_st=*null&ns_st_ce=*null&ns_st_ia=*null&ns_st_ddt=*null&ns_st_tdt=*null&ns_st_pu=Connatix&ns_st_ti=*null&c3=*null&c4=*null&c6=*null&c7=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3451956%2Fwhy-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html%3Futm_source%3DAdestra%26utm_medium%3Demail%26utm_content%3DImage%253A%2520Why%2520India%25E2%2580%2599s%2520data%2520protection%2520law%2520needs%2520to%2520avoid%2520the%2520perfection%2520loophole%26utm_campaign%3DThe%2520Daily%2520Byte%26utm_term%3DThe%2520Daily%2520Byte%26utm_date%3D20191106065622&c8=&c9=&cs_ucfr=0
Pragma
no-cache
Date
Wed, 06 Nov 2019 07:43:49 GMT
Cache-Control
private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Connection
keep-alive
Content-Length
0
Expires
Mon, 01 Jan 1990 00:00:00 GMT
1_360_1.mp4
v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/
64 KB
0
Media
General
Full URL
https://v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/1_360_1.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Range
bytes=458752-

Response headers

x-amz-version-id
1YaqZC7.gjT3DeqS5u_Mw8fNPN8xlWes
via
1.1 varnish, 1.1 varnish
etag
"cc1120ad618b42d4141faea4ef590f1b"
age
86495
x-cache
HIT, HIT
status
206
content-length
12129046
x-served-by
cache-sjc3120-SJC, cache-hhn4063-HHN
content-range
bytes 458752-12587797/12587798
last-modified
Tue, 05 Nov 2019 07:34:05 GMT
x-timer
S1573026230.354704,VS0,VE0
date
Wed, 06 Nov 2019 07:43:50 GMT
content-type
video/mp4
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes, bytes
x-cache-hits
0, 0
1_360_1.mp4
v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/
64 KB
0
Media
General
Full URL
https://v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/1_360_1.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Range
bytes=524288-

Response headers

x-amz-version-id
1YaqZC7.gjT3DeqS5u_Mw8fNPN8xlWes
via
1.1 varnish, 1.1 varnish
etag
"cc1120ad618b42d4141faea4ef590f1b"
age
86496
x-cache
HIT, HIT
status
206
content-length
12063510
x-served-by
cache-sjc3120-SJC, cache-hhn4063-HHN
content-range
bytes 524288-12587797/12587798
last-modified
Tue, 05 Nov 2019 07:34:05 GMT
x-timer
S1573026231.185647,VS0,VE0
date
Wed, 06 Nov 2019 07:43:51 GMT
content-type
video/mp4
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes, bytes
x-cache-hits
0, 0
1_360_1.mp4
v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/
64 KB
0
Media
General
Full URL
https://v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/1_360_1.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Range
bytes=589824-

Response headers

x-amz-version-id
1YaqZC7.gjT3DeqS5u_Mw8fNPN8xlWes
via
1.1 varnish, 1.1 varnish
etag
"cc1120ad618b42d4141faea4ef590f1b"
age
86497
x-cache
HIT, HIT
status
206
content-length
11997974
x-served-by
cache-sjc3120-SJC, cache-hhn4063-HHN
content-range
bytes 589824-12587797/12587798
last-modified
Tue, 05 Nov 2019 07:34:05 GMT
x-timer
S1573026232.018973,VS0,VE0
date
Wed, 06 Nov 2019 07:43:52 GMT
content-type
video/mp4
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes, bytes
x-cache-hits
0, 0
auction
prebid-server.rubiconproject.com/openrtb2/ Frame 63BB
141 B
367 B
XHR
General
Full URL
https://prebid-server.rubiconproject.com/openrtb2/auction
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/prebid/prebid.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.58.133.90 Frankfurt am Main, Germany, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
ec2-52-58-133-90.eu-central-1.compute.amazonaws.com
Software
/
Resource Hash
80cdc1b8e8202d5658a039f356d0022d3fd8c756c4bd6759507911705aa1b533

Request headers

Sec-Fetch-Mode
cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Content-Type
text/plain

Response headers

pragma
no-cache
date
Wed, 06 Nov 2019 07:43:52 GMT
content-encoding
gzip
status
200
content-type
application/json
access-control-allow-origin
https://www.computerworld.com
cache-control
no-cache, no-store, must-revalidate
access-control-allow-credentials
true
content-length
148
expires
0
directsdk.js
aka.spotxcdn.com/integration/directsdk/v1/
Redirect Chain
  • https://js.spotx.tv/directsdk/v1/265228.js
  • https://aka.spotxcdn.com/integration/directsdk/v1/directsdk.js
391 KB
145 KB
Script
General
Full URL
https://aka.spotxcdn.com/integration/directsdk/v1/directsdk.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2.18.68.138 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-68-138.deploy.static.akamaitechnologies.com
Software
nginx /
Resource Hash
de40791a97231d95b94dd9535759ae5b1e7ae0ccf83362951337862307c820fe

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Oct 2019 21:14:16 UTC
Server
nginx
Access-Control-Allow-Headers
ETag
2ae6c9a6b809a0e4036614b5182b0d5a
Vary
Accept-Encoding
Access-Control-Allow-Methods
POST, GET, PATCH, DELETE, OPTIONS
Content-Type
text/javascript;charset=UTF-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=110
Connection
keep-alive
Timing-Allow-Origin
*
X-SpotX-Build-Version
1.30.0-20191022.2011
Content-Length
147920

Redirect headers

Pragma
no-cache
Date
Wed, 06 Nov 2019 07:43:52 GMT
Last-Modified
Wed, 06 Nov 2019 07:43:52 UTC
Server
nginx
Location
//aka.spotxcdn.com/integration/directsdk/v1/directsdk.js
Access-Control-Allow-Methods
GET, POST, OPTIONS
Content-Type
text/plain
Access-Control-Allow-Origin
*
Cache-Control
post-check=0, pre-check=0, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0
Access-Control-Allow-Credentials
false
X-fe
44
Connection
keep-alive
Timing-Allow-Origin
*
Content-Length
0
Expires
Thu, 01 Jan 1970 00:00:00 GMT
prebid.js
static.vidazoo.com/basev/prebid/ Frame 22F2
250 KB
80 KB
Script
General
Full URL
https://static.vidazoo.com/basev/prebid/prebid.js
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
d9d09c199ddc98c21c53d0a8ae899f01a24edb120d295c124cca6f096500d982

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 10:56:10 GMT
ETag
"1572951370"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=22149
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
80772
X-HW
1573026223.dop054.fr8.shc,1573026224.dop054.fr8.t,1573026232.cds018.fr8.c
prebid.js
static.vidazoo.com/basev/prebid/ Frame 8328
250 KB
80 KB
Script
General
Full URL
https://static.vidazoo.com/basev/prebid/prebid.js
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
d9d09c199ddc98c21c53d0a8ae899f01a24edb120d295c124cca6f096500d982

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 10:56:10 GMT
ETag
"1572951370"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=22149
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
80772
X-HW
1573026223.dop054.fr8.shc,1573026224.dop054.fr8.t,1573026232.cds018.fr8.c
prebid.js
static.vidazoo.com/basev/prebid/ Frame 2DB6
250 KB
80 KB
Script
General
Full URL
https://static.vidazoo.com/basev/prebid/prebid.js
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
d9d09c199ddc98c21c53d0a8ae899f01a24edb120d295c124cca6f096500d982

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 10:56:10 GMT
ETag
"1572951370"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=11538
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
80772
X-HW
1573026232.dop051.fr8.shc,1573026232.dop051.fr8.t,1573026232.cds096.fr8.c
prebid.js
static.vidazoo.com/basev/prebid/ Frame 92FA
250 KB
80 KB
Script
General
Full URL
https://static.vidazoo.com/basev/prebid/prebid.js
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
d9d09c199ddc98c21c53d0a8ae899f01a24edb120d295c124cca6f096500d982

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 10:56:10 GMT
ETag
"1572951370"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=11538
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
80772
X-HW
1573026232.dop054.fr8.shc,1573026232.dop054.fr8.t,1573026232.cds096.fr8.c
prebid.js
static.vidazoo.com/basev/prebid/ Frame 09A5
250 KB
80 KB
Script
General
Full URL
https://static.vidazoo.com/basev/prebid/prebid.js
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/1.0.318/sbt.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
tlb.hwcdn.net
Software
/
Resource Hash
d9d09c199ddc98c21c53d0a8ae899f01a24edb120d295c124cca6f096500d982

Request headers

Sec-Fetch-Mode
no-cors
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

Date
Wed, 06 Nov 2019 07:43:52 GMT
Content-Encoding
gzip
Last-Modified
Tue, 05 Nov 2019 10:56:10 GMT
ETag
"1572951370"
Access-Control-Allow-Methods
GET, OPTIONS, HEAD
P3P
CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Cache-Control
max-age=22149
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Access-Control-Allow-Headers
Origin, Accept ,DNT,X-Mx-ReqToken,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type,Content-Length, Accept-Language, Accept-Encoding, Referer, Range
Content-Length
80772
X-HW
1573026223.dop054.fr8.shc,1573026224.dop054.fr8.t,1573026232.cds018.fr8.c
usync.html
eus.rubiconproject.com/ Frame 926C
0
0
Document
General
Full URL
https://eus.rubiconproject.com/usync.html
Requested by
Host: static.vidazoo.com
URL: https://static.vidazoo.com/basev/prebid/prebid.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
104.109.78.125 , Netherlands, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a104-109-78-125.deploy.static.akamaitechnologies.com
Software
Apache/2.2.15 (CentOS) / PHP/5.3.3
Resource Hash

Request headers

Host
eus.rubiconproject.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
cross-site
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate

Response headers

Server
Apache/2.2.15 (CentOS)
X-Powered-By
PHP/5.3.3
p3p
CP="NOI CURa ADMa DEVa TAIa OUR # BUS IND UNI COM NAV INT"
Last-Modified
Mon, 04 Nov 2019 18:36:50 GMT
Content-Encoding
gzip
Content-Length
7530
Content-Type
text/html; charset=UTF-8
Cache-Control
max-age=78573
Expires
Thu, 07 Nov 2019 05:33:25 GMT
Date
Wed, 06 Nov 2019 07:43:52 GMT
Connection
keep-alive
Vary
Accept-Encoding
digitrust.min.js
cdn.digitru.st/prod/1/
40 KB
11 KB
Script
General
Full URL
https://cdn.digitru.st/prod/1/digitrust.min.js
Requested by
Host: aka.spotxcdn.com
URL: https://aka.spotxcdn.com/integration/directsdk/v1/directsdk.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
159.180.84.2 , United States, ASN33047 (INSTART - Instart Logic, Inc, US),
Reverse DNS
Software
DTOrigin /
Resource Hash
26ca840c9d02b5b4c1013bf1e2371ff3e04dea1fb2dc7b60cc7d21345359938d

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

date
Tue, 05 Nov 2019 20:07:05 GMT
content-encoding
gzip
last-modified
Mon, 23 Sep 2019 14:27:17 GMT
server
DTOrigin
etag
"651f6d3b36aa4bd56fedba685427757f"
status
200
p3p
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
access-control-allow-origin
*
cache-control
max-age=86400
x-instart-request-id
4488685307790462631:SEN01-CPVNPPRY13:1573026232:0
x-instart-cache-id
15:13010803099792070398::1572984424
accept-ranges
bytes
content-type
application/javascript
content-length
11230
expires
Wed, 06 Nov 2019 20:07:05 GMT
partner
sync.search.spotxchange.com/
Redirect Chain
  • https://sync.search.spotxchange.com/partner?source=dados
  • https://sync.search.spotxchange.com/partner?source=dados&__user_check__=1&sync_id=2dd4cc36-0069-11ea-9cab-1eddb0c52506
0
563 B
Image
General
Full URL
https://sync.search.spotxchange.com/partner?source=dados&__user_check__=1&sync_id=2dd4cc36-0069-11ea-9cab-1eddb0c52506
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
185.94.180.126 , Netherlands, ASN35220 (SPOTX-AMS, NL),
Reverse DNS
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36

Response headers

x-spotx-halt-type
Audience Dsp sync Priority Sync endpoint Source ID is not on enabled source whitelist
Date
Wed, 06 Nov 2019 07:43:52 GMT
Server
nginx
Access-Control-Allow-Methods
GET, POST, OPTIONS
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0
Access-Control-Allow-Credentials
false
X-fe
143
Connection
keep-alive
Content-Length
0

Redirect headers

Date
Wed, 06 Nov 2019 07:43:52 GMT
Server
nginx
Location
/partner?source=dados&__user_check__=1&sync_id=2dd4cc36-0069-11ea-9cab-1eddb0c52506
Access-Control-Allow-Methods
GET, POST, OPTIONS
Access-Control-Allow-Origin
*
Cache-Control
no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0
Access-Control-Allow-Credentials
false
X-fe
48
Connection
keep-alive
Content-Length
0
1_360_1.mp4
v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/
64 KB
0
Media
General
Full URL
https://v.connatix.com/f7e93031-3802-49c9-b029-968fa78207fd/1_360_1.mp4
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.217 Frankfurt am Main, Germany, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash

Request headers

Sec-Fetch-Mode
cors
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
Accept-Encoding
identity;q=1, *;q=0
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Range
bytes=655360-

Response headers

x-amz-version-id
1YaqZC7.gjT3DeqS5u_Mw8fNPN8xlWes
via
1.1 varnish, 1.1 varnish
etag
"cc1120ad618b42d4141faea4ef590f1b"
age
86498
x-cache
HIT, HIT
status
206
content-length
11932438
x-served-by
cache-sjc3120-SJC, cache-hhn4063-HHN
content-range
bytes 655360-12587797/12587798
last-modified
Tue, 05 Nov 2019 07:34:05 GMT
x-timer
S1573026233.863493,VS0,VE0
date
Wed, 06 Nov 2019 07:43:52 GMT
content-type
video/mp4
access-control-allow-origin
*
cache-control
max-age=31557600
accept-ranges
bytes, bytes
x-cache-hits
0, 0
dt.html
cdn.digitru.st/prod/1.5.37/ Frame B9AC
0
0
Document
General
Full URL
https://cdn.digitru.st/prod/1.5.37/dt.html
Requested by
Host: cdn.digitru.st
URL: https://cdn.digitru.st/prod/1/digitrust.min.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
159.180.84.2 , United States, ASN33047 (INSTART - Instart Logic, Inc, US),
Reverse DNS
Software
DTOrigin /
Resource Hash

Request headers

:method
GET
:authority
cdn.digitru.st
:scheme
https
:path
/prod/1.5.37/dt.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
sec-fetch-mode
nested-navigate
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
cross-site
referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.70 Safari/537.36
Sec-Fetch-Mode
nested-navigate
Referer
https://www.computerworld.com/article/3451956/why-indias-data-protection-law-needs-to-avoid-the-perfection-loophole.html?utm_source=Adestra&utm_medium=email&utm_content=Image%3A%20Why%20India%E2%80%99s%20data%20protection%20law%20needs%20to%20avoid%20the%20perfection%20loophole&utm_campaign=The%20Daily%20Byte&utm_term=The%20Daily%20Byte&utm_date=20191106065622

Response headers

status
200
content-type
text/html
content-length
1303
expires
Wed, 06 Nov 2019 20:07:06 GMT
last-modified
Mon, 23 Sep 2019 14:27:17 GMT
cache-control
max-age=86400
content-encoding
gzip
date
Tue, 05 Nov 2019 20:07:06 GMT
accept-ranges
bytes
etag
"f62ec59165fc2a53f53d87b7d3f33f50"
x-instart-cache-id
4:4824233327175395010::1572984425
x-instart-request-id
17097408698111147158:SEN01-CPVNPPRY13:1573026232:0
p3p
CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
access-control-allow-origin
*
server
DTOrigin
265228
search.spotxchange.com/openrtb/2.3/dados/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
api.rlcdn.com
URL
https://api.rlcdn.com/api/identity?pid=2&rt=envelope
Domain
search.spotxchange.com
URL
https://search.spotxchange.com/openrtb/2.3/dados/265228

Verdicts & Comments Add Verdict or Comment

311 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| getQueryVariable function| addCSS function| $ function| jQuery function| getApolloLocaleSlugMap function| getApolloLocaleIdMap function| getApolloLocaleDescMap function| getApolloLocaleBrandMap function| getCountryCodeLocaleMap function| getCookie function| setCookie function| getFastlyCountryCode function| getLocaleFromCountryCode function| getAutoLocale function| getSelectedLocale function| setSelectedLocale function| browserLocaleError function| setBrowserLocale function| getRedirectLocale function| getBrowserLocale function| getLocale function| __cmp object| consent object| dataLayer object| _sp_ function| getConsentInfo function| idgCMPSourcepointCallback function| runQueue function| watchConsentQueue function| bindReshowCmp object| jQuery110206647910402089579 object| blueConicPreListeners function| BCClass object| blueConicClient string| twitterUrl string| linkedInUrl string| facebookUrl string| youTubeUrl string| twitterHandle string| busUnit string| localeEdition string| busUnitAddress object| IDG object| googletag string| positionDataTag object| adUnitIdsMap function| getSrcCookie function| isElementAboveTheFold function| isElementInViewport function| isVisible function| isTabVisible function| buildPositionData object| adLayer boolean| global_ShowSuper boolean| global_ShowHero string| url object| diagPixSentCodes object| __iasPET object| Logon object| $thm object| headertag function| headertag_render object| pbjs object| rubicontag function| loadGPT function| requestAds function| iasDataHandler number| IASPET_TIMEOUT number| __iasPETTimeoutRequestAds object| Select2 string| isProd string| ocEnabledSite string| brandCode string| brandName string| brandId boolean| regDebugLog boolean| brandIdDemandgen boolean| brandIdEvents boolean| brandIdResearch boolean| brandIdThirdparty boolean| isEu string| regApiUrl string| apiKey string| tokenPrefix string| tokenSuffix string| brandDomain string| insiderContentType boolean| notEmptyArticle boolean| notEmptyMediaResource boolean| isInsiderPremium boolean| isResourceInsiderPremium object| ownerIds string| campaignId string| assetId string| placementId string| clientCompany string| businessUnit object| _alcTag object| ALC object| Hashes boolean| canRunAds string| oneRegPlacementID boolean| supMontMods undefined| segs object| ntvConfig string| prodNames string| prodManufacturers string| prodCategories string| prodVendors string| insiderSignedIn string| idg_uuid string| dlJobFunction object| dlJobPosition object| dlIndustry undefined| insiderToken undefined| tokens string| sincePublished string| edition string| adBlockStatus function| AdBlockEnabled function| numberFromDataLayer function| stringFromDataLayer undefined| userData undefined| hermesAttrs undefined| userKeys object| permutive number| relatedTop string| coreEdition string| coreEditionAbbr string| coreEditionDescription number| ocHeadTop undefined| menuWidth function| animateSlideLeft function| animateSlideRight function| calcAdHeight object| $jscomp object| ntv number| ntvLoadStart undefined| nQuery object| prdom object| onFocusEvents function| ntvjQueryInit function| ntvExtends function| ntvAppendStylesheet function| ntvAppendScript function| ntvArticleTracker object| safeTrackingTags function| ntvGetElementViewability function| ntvViewableImpressionTracker object| ntvToutAds object| PostRelease boolean| onFocus function| parcelRequire function| moment object| ggeac object| closure_memoize_cache_ object| googleToken object| googleIMState object| google_js_reporting_queue function| processGoogleToken object| google_tag_manager function| postscribe function| isValidEmailAddress function| encodeQueryData object| __gcse string| firstSessionDate string| lastSessionDate string| currentSessionDate number| sessionNumber undefined| inSession number| daysSinceLastSession object| currentTime number| longExpiry undefined| lastSessionMS function| parallaxLb function| parallaxLbHandler boolean| supLocaleEd function| exeImuMobile function| exeImuDesktop number| google_srt undefined| google_measure_js_timing string| slot object| google object| closure_lm_663764 string| contentCopyright string| contentEdition boolean| suppressEd string| obEdition string| widgetId function| renderTSO function| selectTSOAds object| SC function| DP_jQuery_1573026221058 object| AWIN function| getLoginStatusForOmniture function| getQsVal function| getTrackingToken function| socialTrack function| linkedInTrack function| initZooms function| readCookie function| readRawCookie function| getUrlParams function| initAccordion undefined| ss_android undefined| ss_set undefined| ss_icons undefined| ss_keywords undefined| ss_legacy undefined| ss_getElementsByClassName undefined| ss_liga object| g_brandAnalyticsInfoMap string| slugCode undefined| newsletterFormAction function| addSlugCode object| LazyLoader object| xrayAd number| ocHead number| relatedContentHeight number| localeId boolean| g_bRequireHttps object| _comscore object| acceptedDomains string| cleanedHost object| a object| f function| _googCsa number| nextSearchboxId function| generateSubtag string| GoogleAnalyticsObject function| ga object| _auto function| ael object| httpRequest function| onYouTubeIframeAPIReady function| udm_ object| ns_p object| COMSCORE number| googleNDT_ number| _googCsaAlwaysHttps number| googleAltLoader object| google_tag_data object| gaplugins object| gaGlobal object| gaData object| twttr function| fbq function| _fbq object| __SKIM_JS_GLOBAL__ object| skimlinksAPI string| _linkedin_partner_id object| _linkedin_data_partner_ids function| twq string| _linkedin_data_partner_id function| lintrk boolean| _already_called_lintrk object| OBR string| OB_releaseVer function| OBR$ object| outbrain object| outbrain_rater object| Mustache function| BlueConicMetaDataService function| FormRuleService function| RuleService function| ouibounce function| BlockAdBlock object| blockAdBlock object| bcConnectionUtil function| md5 function| BlueConicDataLayerUtil object| jsonpath object| jQuery111208821122991086339 object| bc_json998 object| cnxUmm object| cnxEnfStorage function| cnxsetTimeout function| cnxsetInterval string| cnxPageGuid number| spp object| cnxJSONP_ed6ef9ad019cd9e1afcc1573026222073 object| OB_PROXY object| NVPInjector function| _extends function| _typeof function| _createClass function| _classCallCheck string| VIDGET_VERSION function| OB_VidgetServiceCallBack number| vidgetServiceInstance function| OB_VidgetServiceCallBack0 object| OB_VIDGET number| google_global_correlator object| closure_lm_319364 number| extraDataInstance function| obpExtraDataCallback0 object| MoatSuperV26 function| OB_VidgetAuditCallback object| vdz function| OB_CtwClientCalls object| cnxJSONP_fe9957c903d3fc4c70861573026223524 function| webpackJsonpbzkf2i4hd6s undefined| _ object| platform function| setImmediate function| clearImmediate object| vidazoo object| Vidiazoo function| cnxAddEventListener

17 Cookies

Domain/Path Name / Value
.computerworld.com/ Name: _gid
Value: GA1.2.1170576328.1573026221
.computerworld.com/ Name: _ga
Value: GA1.2.279158102.1573026221
.computerworld.com/ Name: AMP_TOKEN
Value: %24NOT_FOUND
www.computerworld.com/article/3451956 Name: fastlyCountryCode
Value: DE
.computerworld.com/ Name: aiia
Value: true
www.computerworld.com/ Name: lastSessionDate
Value: Wed, 06 Nov 2019 07:43:40 GMT
.computerworld.com/ Name: _fbp
Value: fb.1.1573026221518.1155614167
www.computerworld.com/ Name: currentSessionDate
Value: Wed, 06 Nov 2019 07:43:40 GMT
.computerworld.com/ Name: _sp_enable_dfp_personalized_ads
Value: false
www.computerworld.com/ Name: inSession
Value: true
www.computerworld.com/ Name: BCSessionID
Value: No%20profile%20present%20and%20will%20not%20be%20created.
www.computerworld.com/article/3451956 Name: ntvSession
Value: {}
www.computerworld.com/ Name: firstSessionDate
Value: Wed, 06 Nov 2019 07:43:40 GMT
.computerworld.com/ Name: _gat_UA-300704-1
Value: 1
.computerworld.com/ Name: consentUUID
Value: e16488b6-64db-4d95-8025-ece28f77899c
www.computerworld.com/ Name: last_visit_bc
Value: 1573026220663
www.computerworld.com/ Name: sessionNumber
Value: 1

12 Console Messages

Source Level URL
Text
console-api error URL: https://securepubads.g.doubleclick.net/gpt/pubads_impl_2019103101.js(Line 1)
Message:
Exception in queued GPT command TypeError: Cannot read property 'getItem' of null
console-api warning URL: https://www.google.com/cse/static/element/b5752d27691147d6/cse_element__en.js?usqp=CAI%3D(Line 134)
Message:
Component of type results is missing for Element named two-column.
console-api error URL: https://idg.blueconic.net/plugin/library/9694aa882dd83090c8baff998ebb5b60(Line 13)
Message:
Error in getFieldValue: Error: Syntax error, unrecognized expression: 'primaryCategory'
console-api log URL: https://cdn.blueconic.net/idg.js(Line 129)
Message:
[BC]Item will not be scraped due to missing value for required field: insidericon
console-api log (Line 1)
Message:
Local storage not available.
console-api log (Line 1)
Message:
Automate is initialized.
console-api warning URL: https://static.vidazoo.com/basev/prebid/prebid.js(Line 3)
Message:
fun-hooks: referenced 'registerAdserver' but it was never created
console-api warning URL: https://static.vidazoo.com/basev/prebid/prebid.js(Line 3)
Message:
fun-hooks: referenced 'registerAdserver' but it was never created
console-api warning URL: https://static.vidazoo.com/basev/prebid/prebid.js(Line 3)
Message:
fun-hooks: referenced 'registerAdserver' but it was never created
console-api warning URL: https://static.vidazoo.com/basev/prebid/prebid.js(Line 3)
Message:
fun-hooks: referenced 'registerAdserver' but it was never created
console-api warning URL: https://static.vidazoo.com/basev/prebid/prebid.js(Line 3)
Message:
fun-hooks: referenced 'registerAdserver' but it was never created
console-api warning URL: https://static.vidazoo.com/basev/prebid/prebid.js(Line 3)
Message:
fun-hooks: referenced 'registerAdserver' but it was never created

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

adservice.google.com
adservice.google.de
aka.spotxcdn.com
alt.idgesg.net
ampcid.google.com
ampcid.google.de
analytics.twitter.com
api.rlcdn.com
api.skimlinks.mgr.consensu.org
automate-prod.s3.amazonaws.com
automate.linksynergy.com
bis.vidazoo.com
cdn.adsafeprotected.com
cdn.blueconic.net
cdn.connatix.com
cdn.digitru.st
cdn.permutive.com
cdns.connatix.com
ck.connatix.com
clients1.google.com
cmp.computerworld.com
connect.facebook.net
core.connatix.com
cse.google.com
csi.gstatic.com
d2zv5rkii46miq.cloudfront.net
edt.cio.com
eus.rubiconproject.com
i.connatix.com
idg.blueconic.net
idge.staticworld.net
images.idgesg.net
images.outbrainimg.com
imasdk.googleapis.com
inventory.vidazoo.com
jadserve.postrelease.com
js-sec.indexww.com
js.spotx.tv
libs.outbrain.com
libs.sphere.com
log.outbrainimg.com
match.adsrvr.org
mcdp-nydc1.outbrain.com
mv.outbrain.com
ntvcld-a.akamaihd.net
odb.outbrain.com
p.skimresources.com
p.typekit.net
pixel.adsafeprotected.com
platform.twitter.com
prebid-server.rubiconproject.com
px.ads.linkedin.com
r.skimresources.com
r12---sn-4g5ednzz.googlevideo.com
r5---sn-4g5ednsl.googlevideo.com
s.ntv.io
s.skimresources.com
s0.2mdn.net
sb.scorecardresearch.com
search.spotxchange.com
securepubads.g.doubleclick.net
server.vidazoo.com
snap.licdn.com
sourcepoint.mgr.consensu.org
static.ads-twitter.com
static.vidazoo.com
sync.search.spotxchange.com
t.co
t.skimresources.com
tcheck.outbrainimg.com
trk.connatix.com
uploads-ssl.webflow.com
use.fontawesome.com
use.typekit.net
v.connatix.com
vastcdn.outbrain.com
videoadextradata.outbrain.com
videoclientsservicescalls.outbrain.com
w.soundcloud.com
widgets.outbrain.com
www.computerworld.com
www.dwin2.com
www.facebook.com
www.google-analytics.com
www.google.com
www.googletagmanager.com
www.linkedin.com
api.rlcdn.com
search.spotxchange.com
104.109.64.186
104.109.78.125
104.19.149.54
104.244.42.131
104.244.42.5
13.224.196.57
13.225.78.11
143.204.101.120
151.101.112.157
151.101.114.110
151.101.114.165
151.101.114.2
151.101.114.217
151.101.14.165
151.101.14.2
151.101.14.217
151.101.194.49
151.139.128.10
159.180.84.2
172.217.16.130
18.194.227.247
184.31.90.250
185.94.180.126
185.94.180.127
199.166.0.26
2.16.186.99
2.18.68.138
2.18.69.197
2.18.69.225
2.18.69.96
2.18.70.82
23.111.9.35
23.45.99.242
2600:9000:21f3:7c00:17:5578:e080:21
2606:2800:234:59:254c:406:2366:268c
2607:f8b0:4001:c03::5e
2a00:1450:4001:6a::a
2a00:1450:4001:800::200e
2a00:1450:4001:808::2008
2a00:1450:4001:808::200a
2a00:1450:4001:809::200e
2a00:1450:4001:81c::2002
2a00:1450:4001:820::2006
2a00:1450:4001:820::200e
2a00:1450:4001:821::200e
2a00:1450:4001:825::2004
2a00:1450:4001:9::c
2a02:26f0:10c:381::2a83
2a02:26f0:6c00:296::25ea
2a03:2880:f01c:8012:face:b00c:0:3
2a03:2880:f11c:8183:face:b00c:0:25de
2a05:f500:10:101::b93f:9101
2a05:f500:10:101::b93f:9105
3.123.110.218
3.225.101.71
34.224.34.200
35.153.215.15
35.190.40.172
35.190.59.101
35.201.67.47
52.203.78.22
52.218.212.138
52.54.204.2
52.58.133.90
52.85.183.120
54.154.201.99
54.236.131.34
54.81.224.214
64.202.112.127
64.202.112.63
69.16.175.10
70.42.32.31
70.42.32.95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