Websites Are Tracking You Via Browser Fingerprinting
-
I have never been able to figure out how to block fingerprinting without entirely disabling my browser and it looks like the race to the bottom is accelerating
maybe blocking it is the wrong way to go about though. Instead there should be some way to make the fingerprinting data worthless by having everyones browser constantly change things in the background so the fingerprint changes too
-
It is not the default because it can also break meaningful functionality.
Seems like it might be useful to have a per-site toggle.
-
This is why I use Firefox + Canvasblocker + ublock origin I try to disable Javascript if it isn't required for functionality for the stuff am doing or I trust the site (using noscript)
Noscript on my personal machines
Marketers are a pox
If you’re a marketer, fuck you get a real job.
-
Headline should read "Websites have been tracking you by browser fingerprinting for a while. Google publicly doing it for 6 months."
Test your footprint:
https://abrahamjuliot.github.io/creepjs/Am I Unique ?
Check if your browser has a unique fingerprint, how identifiable you are on the Internet
(www.amiunique.org)
How effective is the TOR browser against CreepJS?
-
They were doing this a decade ago, to help track app marketing campaigns.
IIRC, it turned out you could get pretty close to uniquely identifying a device with permutations on only 7 attributes. The problem is if you install a plugin to return false data, it could break non-malicious websites, like running games or data visualizations.
Am I misunderstanding something? Wouldn't that just be 7! = 5040 possibilities?
-
How effective is the TOR browser against CreepJS?
100%. They all look the same.
-
I really wish there was a foolproof way of preventing fingerprinting. Disabling JavaScript unfortunately isn't really an option, no-one builds websites with progressive enhancement in mind these days.
JShelter and uBO medium mode to the rescue. Pair that with Librewolf and you're pretty secure against fingerprinting.
-
This post did not contain any content.
Mullvad has a fork of Firefox they built with TOR (the organization, it does not route over TOR network). Includes NoScript and ublock origin and works by making all browsers the same ( so long as you don’t fsck with it).
You don’t have to use it with their VPN but that’s good, too.
My only complaint is it doesn’t support containers. Otherwise it’s wonderful.
Free the internet. With the Mullvad Browser.
The Mullvad Browser is a privacy-focused web browser developed in collaboration between Mullvad VPN and the Tor Project. It’s produced to minimize tracking and fingerprinting.
Mullvad VPN (mullvad.net)
-
Things which were obvious for any paranoid I2P user 15 years ago, and were being discussed in Freenet 20 years ago, and by cypherpunks 30 years ago, are again new and unexpected.
See, you can murder people in the open if you can make it comfortable enough for everyone to ignore it.
Surveillance and censorship should be scarier, because without them you can cry out about the murderer or avoid strategic disadvantage against the murderer, but are not - most people haven't been in real danger they understood. And even if they were - suppose that's already happening, people are being murdered in the open, censorship and surveillance happen, and the latter causes more outrage, - we all can see nobody cares enough to pay with a few bruises for opposing it, not just their living, health, life.
Here we are.
I didn’t see anything about this in my facebook feed.
/s
-
maybe blocking it is the wrong way to go about though. Instead there should be some way to make the fingerprinting data worthless by having everyones browser constantly change things in the background so the fingerprint changes too
Free the internet. With the Mullvad Browser.
The Mullvad Browser is a privacy-focused web browser developed in collaboration between Mullvad VPN and the Tor Project. It’s produced to minimize tracking and fingerprinting.
Mullvad VPN (mullvad.net)
-
Am I misunderstanding something? Wouldn't that just be 7! = 5040 possibilities?
You're mistakenly assuming the attributes are binary, stuff like screen resolution, regions, languages all have many possible values to help narrow down and identify you. It really doesn't take that many for you to be identifiable.
-
JShelter and uBO medium mode to the rescue. Pair that with Librewolf and you're pretty secure against fingerprinting.
Thanks for recommending JShelter! I'll add it to my list
-
This post did not contain any content.
Soooo, how do I access the full article? I have to pay? Lol
-
Mullvad has a fork of Firefox they built with TOR (the organization, it does not route over TOR network). Includes NoScript and ublock origin and works by making all browsers the same ( so long as you don’t fsck with it).
You don’t have to use it with their VPN but that’s good, too.
My only complaint is it doesn’t support containers. Otherwise it’s wonderful.
Free the internet. With the Mullvad Browser.
The Mullvad Browser is a privacy-focused web browser developed in collaboration between Mullvad VPN and the Tor Project. It’s produced to minimize tracking and fingerprinting.
Mullvad VPN (mullvad.net)
+1. Mullvad browser is the best when it comes to browse the clearnet (not Tor). Also, if anyone reading this, do not compile Mullvad browser yourself, only use the official binary from the Mullvad site (or the -bin variant if you use Arch Linux AUR) since from my testing, different compiled versions of Mullvad browsers come with different fingerprints.
Using an optimized build from CachyOS and using it on CreepJS will give you a low amount of visits, same goes with the Flatpak build, but the binary from the Mullvad site gives around 2k views, which means that at least 2k people have the exact same fingerprint as you, but of course, it counts the people that have visited CreepJS to test their fingerprint. There is also fingerprint.com which seems to be wayyy more advanced.
-
Canvasblocker?
Yes thank you
-
This post did not contain any content.
This isn't new. Reddit is infamous for this too
-
You're mistakenly assuming the attributes are binary, stuff like screen resolution, regions, languages all have many possible values to help narrow down and identify you. It really doesn't take that many for you to be identifiable.
Oh right, thanks
-
This post did not contain any content.
Could we just create random fingerprints each time the website was visited?
-
Could we just create random fingerprints each time the website was visited?
Yes, but if they combine your fingerprint with your IP, they can see that there are 9 unique fingerprints and several others seemingly changing at random, ergo 10 people.