this post was submitted on 27 Feb 2025
58 points (100.0% liked)

Privacy

37039 readers
16 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

Tor is off the table for me because it's so slow. If you can point to some test sites or documentation that supports your choice, please include!

all 36 comments
sorted by: hot top controversial new old
[–] [email protected] 32 points 2 months ago* (last edited 2 months ago) (2 children)

I've tested this on Debian and roughly:

  1. Mullvad (default): A+
  2. Librewolf (+setup): B
  3. Librewolf (default): C
  4. Firefox (default): D
  5. Chromium (default): F

Try out https://coveryourtracks.eff.org/

[–] [email protected] 9 points 2 months ago (2 children)

This has been my experience as well. What tweaks are you making to default librewolf?

[–] [email protected] 11 points 2 months ago* (last edited 2 months ago)

Technically, the best way to blend in is to avoid changing the behaviour much from the default. I would still advise the below settings because they do improve your security, and anti-fingerprinting against naive first-party fingerprinting scripts (all 3rd party scripts/iframes should be blocked, see below: uBlock Medium/Hard). If you need protection against advanced fingerprinting use Tor/Mullvad browser.

uBlock:

  • Change uBlock blocking mode to Medium or Hard using the instructions on their Github wiki. Can cause site breakage on shitty websites (eg sites that import large JS libraries from remote sources). It is a substantial improvement over default, see the wiki for medium mode: https://github.com/gorhill/uBlock/wiki/Blocking-mode:-medium-mode

  • Enable filterlist Privacy>Block Outside Intrusion to LAN (Access to LAN is used to fingerprint or by threat actors during reconnaissance phase of hacking)

  • Consider enabling other filterlists included in uBlock. Try to minimize enabling extra lists from the default to avoid further fingerprinting.

Librewolf:

  • Enable limiting of referrers under LibreWolf Preferences>Privacy>Limit cross-origin referers

  • Enable letterboxing under LibreWolf Preferences>Fingerprinting>Enable letterboxing

[–] [email protected] 1 points 2 months ago* (last edited 2 months ago) (1 children)

Neptr covered it better than I could've. I also added privacy badger though I'm not sure that does anything🤷

[–] [email protected] 4 points 2 months ago (1 children)

The more plugins you add, the more unique you become, just FYI.

[–] [email protected] 1 points 2 months ago
[–] [email protected] 0 points 2 months ago
[–] [email protected] 18 points 2 months ago (2 children)

Can't someone come up with a browser that just randomly lies when asked about the characteristics that could be used for fingerprinting?

Except for trusted, whitelisted sites.

That seems like it would be a pretty good privacy enhancer.

[–] [email protected] 4 points 2 months ago (1 children)

It would really stand out.

[–] [email protected] 5 points 2 months ago* (last edited 2 months ago) (1 children)

It would produce something completely different every time.

You either need to be indistinguishable from everyone else, or indistinguishable from your last page load.

Just randomly inserting fake fonts, changing your screen resolution by a few pixels, changing the variant of English between US, Canada, UK and Australia. Rendering text and images with unnoticeable random dither in the subpixel hinting. That sort of stuff.

[–] [email protected] 1 points 2 months ago

No, the point is... It might be obvious you're using that specific browser, since it'd be very niche, and combined with something like your IP and maybe something like browsing patterns that might be enough to identify you.

It doesn't matter how much fingerprinting information you hide if you replace it with new information that's just as useful.

[–] [email protected] 1 points 2 months ago

Not sure about the whitelisting part, but I think this is what Brave already does. Randomizing fingerprinted data as opposed to blending in. Makes it hard to build a profile on.

[–] [email protected] 14 points 2 months ago* (last edited 2 months ago) (1 children)

Use this site to test your uniqueness in different browsers and VPN setups:

https://abrahamjuliot.github.io/creepjs/

I have found that Mullvad Browser + VPN (with DAITA and Multihop ON) are better than FireFox or LibreWolf. Me and another user on here went through a little back and forth comparing some things. Just follow the comment thread from here:

https://programming.dev/comment/15090531

(take it with a grain of salt and DYOR, we are not experts)

Also, I love Tor, but another reason to be careful: exit nodes can be run by anyone, including bad actors and any 3-letter agency in the world. At the very least, add a VPN layer when using Tor.

ETA: Keep in mind that it's not just the browser that matters. Your screen size, GPU, operating system, and several other factors also add or take away from your uniqueness in terms of browser fingerprint. Basically, they less you change in the browser, the more generic and similar to everyone else you look like. The better your OS hides things from apps (for instance, in flatpak sandboxes) the better.

ETA2: I like creepjs for testing over EFF's tool for one main reason. EFF tells you how unique you are, theoretically. Creepjs actually takes extra steps to make a guess at whether or not the browser is lying and trying to hide from fingerprinting. That being said, might as well use both to corroborate.

[–] [email protected] 2 points 2 months ago* (last edited 2 months ago)

For the record you can exclude certain countries from your tor options. I am of the opinion that most people aren't going to need to avoid government stuff, but if you do, exclude, say, 5 eyes countries if you live in one. It'll make it quite hard for them to get the full picture

[–] [email protected] 10 points 2 months ago

You need to use or spoof a browser that is used by a lot of people, and have a screen resolution (or spoof) that is common (like 1920x1080), and set the browser to only use basic fonts like times new roman, consolas. Avoid sites that use canvas, or install a canvas blocker, which basically ignores this html element when loading the page. Mitigating fingerprinting is about blending in

[–] [email protected] 8 points 2 months ago* (last edited 2 months ago) (1 children)

Mullvad and Tor and it isn't close. I use it to circumvent bans on social media when I say something too communist. Don't alter it with addons in any way its perfect as it is.

If google, reddit, facebook, etc. can't figure out I'm circumventing them I consider that good enough.

I also like Mullvad for most cases it has adblock by default which lowers the annoyances.

Many websites will be pissy if you're secure as possible. Tor and Mullvad browser make them very pissy often. Its best to have a backup browser for that and normal activities. Librewolf and Ungoogled Chromium are good choices there. More secure, but fingerprintable enough that sites don't get pissy.

[–] [email protected] 2 points 2 months ago

Facebook doesn't care about vpns or fake users/accounts because it drives enfagement.

[–] [email protected] 7 points 2 months ago

Mullvad browser

[–] [email protected] 6 points 2 months ago

Ironfox on Android is great.

[–] [email protected] 6 points 2 months ago (2 children)

Default settings or what are we supposed to compare here?

[–] [email protected] 5 points 2 months ago* (last edited 2 months ago)

Yeah if default settings, mullvad is probably hard to beat if tor is off the table.

[–] [email protected] 0 points 2 months ago

🤔Well, hmmm. How bout out of the box/to start with?

[–] [email protected] 2 points 2 months ago

Haven't heard any opinions on arkenfox yet...anyone have any thoughts?

[–] [email protected] 2 points 2 months ago* (last edited 2 months ago) (1 children)

Its is pretty easy to get rid of all the brave crap. You just need a policy file:

# cat /etc/brave/policies/managed/brave_policies.json
{
    "BraveRewardsDisabled": true,
    "BraveWalletDisabled": true,
    "BraveVPNDisabled": 1,
    "BraveAIChatEnabled": true,
    "NewTabPageLocation": "https://search.brave.com/",
    "TorDisabled": false,
    "PasswordManagerEnabled": false,
    "DnsOverHttpsMode": "automatic"
}
[–] [email protected] 3 points 2 months ago (1 children)

Yeah but i don't want to recommend a browser to someone just for them to have some cryptocurrency, AI chatbot, and Ad reward program shoved in their face.

And then telling them that they Can get rid of it, they just have to go make some file they don't understand in a location on their hard drive they've never been to.

Because being real, if Brave's bloat was bundled into an antivirus software, it would rightfully raise red flags for anyone with standard computer literacy.

[–] [email protected] 1 points 2 months ago (1 children)

well yeah I guess some decide to make revenue with this "shady" practices like brave does and others just take 400 millions from google.

[–] [email protected] 2 points 2 months ago

I mean, I fault Mozilla for that, and a lot of other things especially in light of recent developments. But Brave still fosters user dependency on a google project, ceding browser engine market dominance toward google. I might be bale to give Brave a pass for its faults if it was making strong moves in creating a truly free and open internet, but as-is they've basically taken an open-source project, applied their own branding, and baked in functionality that on a better engine can be replicated with more granular control by extensions.