here is a fingerprinting test you can trust https://coveryourtracks.eff.org/
fingerprinting is nasty, i suggest canvas blocker extension because it gives them fake readouts
This is a most excellent place for technology news and articles.
here is a fingerprinting test you can trust https://coveryourtracks.eff.org/
fingerprinting is nasty, i suggest canvas blocker extension because it gives them fake readouts
For me I like to prevent fingerprinting by:
Librewolf(private and less intrusive defaults) + noscript (blocking useless JavaScript) + jsshelter (Javascript sanitization) + Ublock Origin(blocking trackers and ads)
Librewolf + uBlock Origin + Privacy Badger + containerise
For the comedy extra point, a user agent switcher can actively lie about your browser & OS.
uBlock Origin and Privacy Badger shouldn't be paired together. Containers do nothing to prevent your fingerprint from being collected. LibreWolf itself is easily fingerprintable. And the user agent isn't the only telltale sign of your browser and OS, changing it will just make you more unique.
Just use Mullvad Browser with the default settings.
Using a browser like Librewolf is, itself a unique identifier bc not enough people are using it.
EFF has a tool that lets you check your “uniqueness” and bc I used a lesser known browser, it was easier to track me.
Not that I mean you shouldn’t use it. I just wanted to clarify that it doesn’t make you safe from ads. :(
https://coveryourtracks.eff.org/ is the EFF tool.
My results say that I have strong protections against tracking, and that my browser is unique. It's as good as I can get.
The agent switcher also tells the world my Librewolf on Linux is Chrome on Windows.
Thanks for linking it! I should have done that. And if LibreWolf is showing as Chrome on Windows, then you’re good!
Thanks for linking it! I should have done that. And if LibreWolf is showing as Chrome on Windows, then you’re good!
This breaks most websites you’ll visit. Just to keep in mind to others considering locking their browser down.
Does anyone know if Firefox's claimed Anti fingerprinting technology is any good?
it's useless. test it out with creepjs
I'm not looking to be anonymous, I want access to Stargate Atlantis that Amazon Prime is geo blocking from me.
For that, VPN works as advertised.
Why go through the trouble? fmhy.net
I hope you're not raw dogging torrenting Linux ISOs with some form of protection.
I haven't raw dogged the internet in at least 15 years. I meant more along the lines of giving Amazon money.
Yep. That's how I watch F1 too.
I bought a used laptop from a yard sale and only use public Wi-Fi and never use the laptop for anything with my name on it.
Pfft amateur, I break into my local Applbee’s after 2AM and use their POS terminal browser to look at used cars.
Applebee's at 2AM which leaves a physical trail? Noob. I strap meshtastic nodes on wild dogs, using them as a Internet relay at 1-2kb a second, to look at manga leaks.
It's always kind of funny when the Technology folks wade into well-researched and well-worn Privacy territory.
Do you want to not wave a giant flag of your activity to Google, Meta, MS, and your ISP when you do literally anything online? Either use a VPN and Mullvad (or Librewolf, but YMMV) browser, OR a VPN and Tor OR Tor with an https bridge if paying for a VPN will make you a target (Tor bridges are not for casuals, save them for those in genuine need).
VPN locations need to be changed. Frequently. Router level VPN at home becomes your "This is me" location, then make use of VPNs on each device when you want an extra layer of obfuscation.
There's not a lot of middle ground at this point, and it's not difficult.
Router level VPN at home becomes your "This is me" location
You and a thousand other people.
Yeah, but fingerprinting is effective by cross referencing.
There are 1,000 people with the IP 1.2.3.4
There are 500 people with the IP 1.2.3.4 using Firefox
There are 25 people with the IP 1.2.3.4 using Firefox with a 1440p screen
There are 2 people with the IP 1.2.3.4 using Firefox with the dark reader extension with a 1440p screen at 75Hz
etc.
So rotating the IP can screw with that.
Can they still not tell the screen's size if you never fullsize your window? I 'member that advice from back in the day using Tor.
Does that mean my ISP can still detect if I'm going to websites they don't approve of if I'm using Mullvad as my VPN but using Firefox as my browser?
No, with a VPN the only thing your ISP sees is you connecting to a VPN server IP.
But browser finger printing, on the other hand, can identify you to every website you visit, due to info your browser hands over to every website... Such as OS version, Resolution, installed Plugins, browser settings, geolocation info, etc..which is often unique enough to identify you out of the whole of the internet.
Ironically, locking your browser down with more security features/settings/plugins often makes you more identifiable. Cause capitalism is god damned sure they are gonna track you and monetize the hell out of your information, whether its via your name, your user name, or just your digital fingerprint.
I'm always a little shocked at what my browsing habits prevent from these types of things. Thanks for sharing! I feel a little better about my browsing usage!
Jesus, this is scary stuff. Thanks for the link, gonna try my other browsers and devices when I get home.
Your ISP can’t tell who you are contacting if you are using a VPN, but websites will track you by other means.
Ok, cool. It was mainly my ISP I was worried about.
Would be useful for me to find a browser that obfuscated fingerprinting efforts too though.
If you use addons like Ublock-origin. You can reduce the fingerprinting. You can also disable 3rd party iframes, disable Javascript which can further reduce the data being sent to websites.
You also need to change the devices browsers, extensions and timezones to stay anonymous or buy a device and set the most common fingerprint settings, so it is harder for those companies to track you down. It is a slippery slope, and you can check your browser fingerprint and avoid adding unique settings, extensions or anything that can help them to track you.
If the NSA wants you, they will get you. But I can hide from most of you with just a little email relay and a VPN
The only real advantage you gain is being able to watch things outside your region. Without lots of work, you’re pretty easily traceable on the modern internet.
I remember in 1996 my neighbor was in one of these fancy new things on the internet called a "chat room".
He got into an arguement with someone. It got heated. Until the other guy threatened to show up at my neighbors house.
My neighbor scoffed and laughed.
Then the guy put in my neighbors real address. To this day, that still scares me. And back then internet crime wasn't taken seriously. In fact doxxing back then may not yet have even been a crime.
FYI:
https://www.thefire.org/research-learn/doxxing-free-speech-and-first-amendment
In the US, "doxxing" laws are pretty much state-by-state and many may be violating the first amendment.
Today, yes. In 1996 "doxxing" wasn't a term. The internet was so new to people that nobody knew what it could even do.
I'll give you a great example. I remember watching a news report fall of 2000, where K*B Toys was trying this untested idea. Could they use the internet to sell things? The experts said no, and that the internet was a fad. It simply wasn't a medium you could use for commercial things......ebay aside.
In 1996 Google didn't even exist yet. I don't think Amazon was even a bookstore yet. The internet in those days was primitive, and the wild west of the technology realm.
Most vendors are not going to trace you like that. They can, but it’s actually kind of nontrivial and not “easy.”
I’m more thinking about government. I gave up on trying to avoid ad tracking forever ago. But if you think a VPN keeps you safe posting “anonymously”, it doesn’t. That’s more what I’m referring to.
This is why you use a separate browser for different activities and don't cross contaminate.
And your second browser should be Tor