You’re constantly leaving your fingerprint all over the internet. You leave it with the personal information you share willingly, the personal information you share unknowingly, and with the mountain of data that gets sent to each website you load. Maybe you know a thing or two about privacy and decided to pick up a VPN to keep your browsing private. Even then, you’re a lot less private than you expect.

  • hansolo@lemmy.today
    link
    fedilink
    arrow-up
    12
    ·
    4 days ago

    2 schools of thought on fingerprinting.

    One is Tor only and prevent anything, your internet sucks and everything else is exposed.

    Second is that every browser and browser extension and IP makes a new fingerprint. So get a VPN and install vanilla Firefox, Floorp, Chromite, Brave, LibreWolf, Mullvad, and 2 others, all with uBlock Origin (not Brave). Do your business associated with your real name in FF, then rotate VPN locations and browsers based on how you feel. Add JShelter and a header blocker to turn on only when you feel like it. You now have 20 different browser fingerprints and only 1 is tied to your name.

    • Fiery@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      8
      ·
      4 days ago

      Doing all that will reduce/eliminate some data points, but not nearly all.

      https://coveryourtracks.eff.org/

      After running through the test here you can see the various factors that can be used to fingerprint you.

      Your language, timezone, screen specs, gpu, audio etc will not change with your browser.

      • hansolo@lemmy.today
        link
        fedilink
        arrow-up
        3
        ·
        3 days ago

        I’m well-versed in privacy issues.

        EFF’s test is fine, but CreepJS does a better job. I’m really sad that a few months ago they removed an API where it would estimate your fingerprint and give you a 30 day window of how many times you’ve visited. Tor’s benefit was it told me on my first visit that I had been there 80 times in the last 30 days, which wasn’t true at all.

        Fonts are typically where most browsers fail at hiding hyper-detailed fingerprinting. Mullvad and Tor are the only 2 browsers that hide all that, but can’t hide your OS. Nothing can, which is where a VM comes in handy as well. Spoofing values is helpful as it at least masks true values, making your data garbage. Notable garbage, but still garbage.