Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Privacy
  3. The question of browsers

The question of browsers

Scheduled Pinned Locked Moved Privacy
privacy
21 Posts 13 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • P This user is from outside of this forum
    P This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #1

    So, I have always just used one browser, Firefox, with javascript and cookies turned off and whitelisted sites that I needed to use that required javascript or cookies or both to actually work.

    My threat model isn't the tightest and could best be described as "I don't see why they should have my data if I am blocking the ads they use it to try to deliver to me". This browser setup coupled with tracking blocking at the DNS level has made me feel comfortable that while some of my data is being collected I am stopping most of the collection.

    With the advance of fingerprinting and the recent change of a certain browser's terms of use it is probably time to review this setup.

    I believe that it is usually advisable to use two different browsers. One where you are identifying yourself by logging in and one where you are just browsing. As logging into sites usually involves javascript and cookies I was going to use Librewolf with javascript and cookies turned off for general browsing and Mullvad browser as it comes for sites that require javascript and cookies.

    I feel as though I have read a thousand discussions on this subject over the years so I apologise. Does anyone have any suggestions for a more private setup browser-wise? Tracking blocking at DNS level will continue and I'm on debian-based linux.

    Thanks for any help in advance.

    B merde@sh.itjust.worksM neptr@lemmy.blahaj.zoneN J libb@jlai.luL 6 Replies Last reply
    1
    0
    • System shared this topic on
    • P [email protected]

      So, I have always just used one browser, Firefox, with javascript and cookies turned off and whitelisted sites that I needed to use that required javascript or cookies or both to actually work.

      My threat model isn't the tightest and could best be described as "I don't see why they should have my data if I am blocking the ads they use it to try to deliver to me". This browser setup coupled with tracking blocking at the DNS level has made me feel comfortable that while some of my data is being collected I am stopping most of the collection.

      With the advance of fingerprinting and the recent change of a certain browser's terms of use it is probably time to review this setup.

      I believe that it is usually advisable to use two different browsers. One where you are identifying yourself by logging in and one where you are just browsing. As logging into sites usually involves javascript and cookies I was going to use Librewolf with javascript and cookies turned off for general browsing and Mullvad browser as it comes for sites that require javascript and cookies.

      I feel as though I have read a thousand discussions on this subject over the years so I apologise. Does anyone have any suggestions for a more private setup browser-wise? Tracking blocking at DNS level will continue and I'm on debian-based linux.

      Thanks for any help in advance.

      B This user is from outside of this forum
      B This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #2

      Tor browser. Obviously you can't bank with it, but, it's really fine for general browsing. You get some blocking but it's often just a matter of switching exit nodes a few times.

      P 1 Reply Last reply
      0
      • P [email protected]

        So, I have always just used one browser, Firefox, with javascript and cookies turned off and whitelisted sites that I needed to use that required javascript or cookies or both to actually work.

        My threat model isn't the tightest and could best be described as "I don't see why they should have my data if I am blocking the ads they use it to try to deliver to me". This browser setup coupled with tracking blocking at the DNS level has made me feel comfortable that while some of my data is being collected I am stopping most of the collection.

        With the advance of fingerprinting and the recent change of a certain browser's terms of use it is probably time to review this setup.

        I believe that it is usually advisable to use two different browsers. One where you are identifying yourself by logging in and one where you are just browsing. As logging into sites usually involves javascript and cookies I was going to use Librewolf with javascript and cookies turned off for general browsing and Mullvad browser as it comes for sites that require javascript and cookies.

        I feel as though I have read a thousand discussions on this subject over the years so I apologise. Does anyone have any suggestions for a more private setup browser-wise? Tracking blocking at DNS level will continue and I'm on debian-based linux.

        Thanks for any help in advance.

        merde@sh.itjust.worksM This user is from outside of this forum
        merde@sh.itjust.worksM This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #3

        your setup looks good to me

        1 Reply Last reply
        0
        • B [email protected]

          Tor browser. Obviously you can't bank with it, but, it's really fine for general browsing. You get some blocking but it's often just a matter of switching exit nodes a few times.

          P This user is from outside of this forum
          P This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #4

          Thanks. Is Tor browser as effective if not used over tor? My tracking blocking is via a VPN that I trust and want to continue using so I wasn't thinking of using tor. I think I read somewhere that using VPN over tor or tor over VPN somehow became less private (I'm not technical so this might not be right - maybe someone could explain it). I was going to use Mullvad as I believe it has many of the same qualities as Tor browser but is more focused on use with a VPN rather than Tor.

          merde@sh.itjust.worksM D B 3 Replies Last reply
          0
          • P [email protected]

            Thanks. Is Tor browser as effective if not used over tor? My tracking blocking is via a VPN that I trust and want to continue using so I wasn't thinking of using tor. I think I read somewhere that using VPN over tor or tor over VPN somehow became less private (I'm not technical so this might not be right - maybe someone could explain it). I was going to use Mullvad as I believe it has many of the same qualities as Tor browser but is more focused on use with a VPN rather than Tor.

            merde@sh.itjust.worksM This user is from outside of this forum
            merde@sh.itjust.worksM This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #5

            Mullvad is the TOR browser without the TOR network

            1 Reply Last reply
            0
            • P [email protected]

              So, I have always just used one browser, Firefox, with javascript and cookies turned off and whitelisted sites that I needed to use that required javascript or cookies or both to actually work.

              My threat model isn't the tightest and could best be described as "I don't see why they should have my data if I am blocking the ads they use it to try to deliver to me". This browser setup coupled with tracking blocking at the DNS level has made me feel comfortable that while some of my data is being collected I am stopping most of the collection.

              With the advance of fingerprinting and the recent change of a certain browser's terms of use it is probably time to review this setup.

              I believe that it is usually advisable to use two different browsers. One where you are identifying yourself by logging in and one where you are just browsing. As logging into sites usually involves javascript and cookies I was going to use Librewolf with javascript and cookies turned off for general browsing and Mullvad browser as it comes for sites that require javascript and cookies.

              I feel as though I have read a thousand discussions on this subject over the years so I apologise. Does anyone have any suggestions for a more private setup browser-wise? Tracking blocking at DNS level will continue and I'm on debian-based linux.

              Thanks for any help in advance.

              neptr@lemmy.blahaj.zoneN This user is from outside of this forum
              neptr@lemmy.blahaj.zoneN This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #6

              It seems like an interesting setup. I don't really have too much to say other than nitpicks.

              Why not use Mullvad browser for both scenarios. Mullvad with security level safest should block all JS. You could create a 2nd profile for safest only mode.

              Using Linux .desktop launcher scripts, you could:

              • Create a .desktop launcher (in ~/.local/share/applications/) for each profile
              • Edit default desktop launcher to always prompt to choice profile on start (using the launch option -P)
              • Edit the default launcher to offer a menu option for each profile.

              Related to your choice of host OS, I personally avoid Debian for desktop because it is slow to adapt (cus its Debian). I know it isnt directly applicable to situation since your main concern seems to be anti-fingerprinting, but a secure base is important. I'd like to know your reason for picking it. I don't dislike Debian and I still use it for different things (mostly VMs and some dev work).

              T 1 Reply Last reply
              0
              • P [email protected]

                So, I have always just used one browser, Firefox, with javascript and cookies turned off and whitelisted sites that I needed to use that required javascript or cookies or both to actually work.

                My threat model isn't the tightest and could best be described as "I don't see why they should have my data if I am blocking the ads they use it to try to deliver to me". This browser setup coupled with tracking blocking at the DNS level has made me feel comfortable that while some of my data is being collected I am stopping most of the collection.

                With the advance of fingerprinting and the recent change of a certain browser's terms of use it is probably time to review this setup.

                I believe that it is usually advisable to use two different browsers. One where you are identifying yourself by logging in and one where you are just browsing. As logging into sites usually involves javascript and cookies I was going to use Librewolf with javascript and cookies turned off for general browsing and Mullvad browser as it comes for sites that require javascript and cookies.

                I feel as though I have read a thousand discussions on this subject over the years so I apologise. Does anyone have any suggestions for a more private setup browser-wise? Tracking blocking at DNS level will continue and I'm on debian-based linux.

                Thanks for any help in advance.

                J This user is from outside of this forum
                J This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #7

                with javascript and cookies turned off

                My threat model isn’t the tightest

                If that's not tight, I hardly know what is. The modern web is all but unusable without JS.

                flagstaff@programming.devF P 2 Replies Last reply
                0
                • P [email protected]

                  Thanks. Is Tor browser as effective if not used over tor? My tracking blocking is via a VPN that I trust and want to continue using so I wasn't thinking of using tor. I think I read somewhere that using VPN over tor or tor over VPN somehow became less private (I'm not technical so this might not be right - maybe someone could explain it). I was going to use Mullvad as I believe it has many of the same qualities as Tor browser but is more focused on use with a VPN rather than Tor.

                  D This user is from outside of this forum
                  D This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #8

                  Tor inside a VPN is fine.
                  Some argue it will make you stand out in comparison with other users of your VPN but that's only a problem if they retain data, and if they do you really wish you'd have used tor...

                  frostypolicy@suppo.fiF 1 Reply Last reply
                  0
                  • P [email protected]

                    Thanks. Is Tor browser as effective if not used over tor? My tracking blocking is via a VPN that I trust and want to continue using so I wasn't thinking of using tor. I think I read somewhere that using VPN over tor or tor over VPN somehow became less private (I'm not technical so this might not be right - maybe someone could explain it). I was going to use Mullvad as I believe it has many of the same qualities as Tor browser but is more focused on use with a VPN rather than Tor.

                    B This user is from outside of this forum
                    B This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #9

                    Tor browser inherently uses tor, as the other comment says, Mulvad offers tor browser sans tor as Mulvad browser. As per the "do you tor over VPN" issue I think we need to first cover some networking concepts...

                    So your internet works via protocols, UDP provides a basic connection where you can send unordered messages, TCP works on top of UDP to provide linear order. Things like old video chat and bittorrent work over UDP because you don't care about order, you just want the data as you get it, so the video freezes or glitches, but you get the most recent frame of the video. Things like programs and webpages aren't YOLO about data integrity, so they use TCP which enforces order, so you don't get frames from 1 minute later in your Netflix video out of sync. VPNs provide UDP, which is lower level than TCP, which tor provides, so you can tor over VPN but you cannot VPN over tor.

                    If you use Mulvad browser from your VPN, you will look like everyone using Mulvad browser from your VPN exit point, which may well just be you, it's fairly esoteric. If you use tor browser, you will appear to be exiting from a tor exit node along with hundreds if not thousands of other tor browser users.

                    frostypolicy@suppo.fiF 1 Reply Last reply
                    0
                    • J [email protected]

                      with javascript and cookies turned off

                      My threat model isn’t the tightest

                      If that's not tight, I hardly know what is. The modern web is all but unusable without JS.

                      flagstaff@programming.devF This user is from outside of this forum
                      flagstaff@programming.devF This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #10

                      He may as well go without images, too, and use Lynx Browser, haha. I can't even figure out how to install that one!

                      C 1 Reply Last reply
                      0
                      • neptr@lemmy.blahaj.zoneN [email protected]

                        It seems like an interesting setup. I don't really have too much to say other than nitpicks.

                        Why not use Mullvad browser for both scenarios. Mullvad with security level safest should block all JS. You could create a 2nd profile for safest only mode.

                        Using Linux .desktop launcher scripts, you could:

                        • Create a .desktop launcher (in ~/.local/share/applications/) for each profile
                        • Edit default desktop launcher to always prompt to choice profile on start (using the launch option -P)
                        • Edit the default launcher to offer a menu option for each profile.

                        Related to your choice of host OS, I personally avoid Debian for desktop because it is slow to adapt (cus its Debian). I know it isnt directly applicable to situation since your main concern seems to be anti-fingerprinting, but a secure base is important. I'd like to know your reason for picking it. I don't dislike Debian and I still use it for different things (mostly VMs and some dev work).

                        T This user is from outside of this forum
                        T This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #11

                        What host os do you use?

                        neptr@lemmy.blahaj.zoneN 1 Reply Last reply
                        0
                        • T [email protected]

                          What host os do you use?

                          neptr@lemmy.blahaj.zoneN This user is from outside of this forum
                          neptr@lemmy.blahaj.zoneN This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #12

                          I recommend Fedora or openSUSE Tumbleweed.

                          1 Reply Last reply
                          0
                          • P [email protected]

                            So, I have always just used one browser, Firefox, with javascript and cookies turned off and whitelisted sites that I needed to use that required javascript or cookies or both to actually work.

                            My threat model isn't the tightest and could best be described as "I don't see why they should have my data if I am blocking the ads they use it to try to deliver to me". This browser setup coupled with tracking blocking at the DNS level has made me feel comfortable that while some of my data is being collected I am stopping most of the collection.

                            With the advance of fingerprinting and the recent change of a certain browser's terms of use it is probably time to review this setup.

                            I believe that it is usually advisable to use two different browsers. One where you are identifying yourself by logging in and one where you are just browsing. As logging into sites usually involves javascript and cookies I was going to use Librewolf with javascript and cookies turned off for general browsing and Mullvad browser as it comes for sites that require javascript and cookies.

                            I feel as though I have read a thousand discussions on this subject over the years so I apologise. Does anyone have any suggestions for a more private setup browser-wise? Tracking blocking at DNS level will continue and I'm on debian-based linux.

                            Thanks for any help in advance.

                            libb@jlai.luL This user is from outside of this forum
                            libb@jlai.luL This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #13

                            Does anyone have any suggestions for a more private setup browser-wise? Tracking blocking at DNS level will continue and I’m on debian-based linux.

                            My worries sound similar to yours but my approach is a bit different.

                            • I switched from Mac to Linux (Arch, then Debian and for the last 4 years, Mint).
                            • I use EU services as much as I can instead of the US ones.
                            • I do block as much tracking and ad crap as I can. Still use javascript on a few sites.
                            • I use different browsers for different activities.

                            But I also consider this a lost cause. Sadly.

                            • I consider anything I do online (read, write, watch, listen to,...) is at risk of being tracked, and exploited, mined or whatever and somehow linked to the real me (not to one of my pseudonyms).
                            • With an increasing speed and willingness to destroy any remaining rights to privacy we may still have, I'm also expecting my country (France) to sooner than later make it illegal to use real encryption, to use a VPN, or even to use a pseudonym instead of my real name—all of that for my own good and for the protection of little kids which is obviously something that I as a law abiding citizen would not ever dare question.

                            So, instead, I do as much things as I can offline. Reading, writing, watching stuff, listening to stuff, communicating with people.

                            1 Reply Last reply
                            0
                            • B [email protected]

                              Tor browser inherently uses tor, as the other comment says, Mulvad offers tor browser sans tor as Mulvad browser. As per the "do you tor over VPN" issue I think we need to first cover some networking concepts...

                              So your internet works via protocols, UDP provides a basic connection where you can send unordered messages, TCP works on top of UDP to provide linear order. Things like old video chat and bittorrent work over UDP because you don't care about order, you just want the data as you get it, so the video freezes or glitches, but you get the most recent frame of the video. Things like programs and webpages aren't YOLO about data integrity, so they use TCP which enforces order, so you don't get frames from 1 minute later in your Netflix video out of sync. VPNs provide UDP, which is lower level than TCP, which tor provides, so you can tor over VPN but you cannot VPN over tor.

                              If you use Mulvad browser from your VPN, you will look like everyone using Mulvad browser from your VPN exit point, which may well just be you, it's fairly esoteric. If you use tor browser, you will appear to be exiting from a tor exit node along with hundreds if not thousands of other tor browser users.

                              frostypolicy@suppo.fiF This user is from outside of this forum
                              frostypolicy@suppo.fiF This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #14

                              You got most things right about UDP and TCP. They both work in the transport layer of the OSI model. They are also completely different protocols, related yes but independent.

                              UDP is "simpler" as it basically throws data packages in to the network and hope they reach their destination. TCP on the other hand has checks in place that verifies that a data package has actually reached its destination.

                              1 Reply Last reply
                              0
                              • D [email protected]

                                Tor inside a VPN is fine.
                                Some argue it will make you stand out in comparison with other users of your VPN but that's only a problem if they retain data, and if they do you really wish you'd have used tor...

                                frostypolicy@suppo.fiF This user is from outside of this forum
                                frostypolicy@suppo.fiF This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #15

                                It depends on your threat model. Using tor via a know vpn endpoint does make you stand out and can be used to profile your traffic. One of the main points of tor is that all users look exactly the same.

                                If you have e.g. one user out of a 100 using a vpn endpoint instead of some residential ip address that user immediately becomes a much more interesting target. There is information floating around in the web that state actors control both entry and exit nodes.

                                1 Reply Last reply
                                0
                                • P [email protected]

                                  So, I have always just used one browser, Firefox, with javascript and cookies turned off and whitelisted sites that I needed to use that required javascript or cookies or both to actually work.

                                  My threat model isn't the tightest and could best be described as "I don't see why they should have my data if I am blocking the ads they use it to try to deliver to me". This browser setup coupled with tracking blocking at the DNS level has made me feel comfortable that while some of my data is being collected I am stopping most of the collection.

                                  With the advance of fingerprinting and the recent change of a certain browser's terms of use it is probably time to review this setup.

                                  I believe that it is usually advisable to use two different browsers. One where you are identifying yourself by logging in and one where you are just browsing. As logging into sites usually involves javascript and cookies I was going to use Librewolf with javascript and cookies turned off for general browsing and Mullvad browser as it comes for sites that require javascript and cookies.

                                  I feel as though I have read a thousand discussions on this subject over the years so I apologise. Does anyone have any suggestions for a more private setup browser-wise? Tracking blocking at DNS level will continue and I'm on debian-based linux.

                                  Thanks for any help in advance.

                                  azalty@jlai.luA This user is from outside of this forum
                                  azalty@jlai.luA This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by
                                  #16

                                  Have you tried LibreWolf ?

                                  1 Reply Last reply
                                  0
                                  • flagstaff@programming.devF [email protected]

                                    He may as well go without images, too, and use Lynx Browser, haha. I can't even figure out how to install that one!

                                    C This user is from outside of this forum
                                    C This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #17
                                    # Debian
                                    sudo apt install lynx
                                    # Fedora
                                    sudo dnf install lynx
                                    # arch, BTW
                                    sudo pacman -Sy lynx
                                    
                                    flagstaff@programming.devF 1 Reply Last reply
                                    0
                                    • J [email protected]

                                      with javascript and cookies turned off

                                      My threat model isn’t the tightest

                                      If that's not tight, I hardly know what is. The modern web is all but unusable without JS.

                                      P This user is from outside of this forum
                                      P This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #18

                                      What I meant by my threat model not being the tightest was that if I want to read something on a site that requires javascript and cookies then I will just turn them back on temporarily rather than not read what I want just because of possible tracking.

                                      I agree with your point about the web being almost unusable in parts without JavaScript. However, I find that a lot of sites have a lot of javascript-heavy pages at the front but simpler pages behind where you get to things you actually want to look at. Usually a site's RSS feeds let you get directly to the simpler pages without using JavaScript.

                                      1 Reply Last reply
                                      0
                                      • C [email protected]
                                        # Debian
                                        sudo apt install lynx
                                        # Fedora
                                        sudo dnf install lynx
                                        # arch, BTW
                                        sudo pacman -Sy lynx
                                        
                                        flagstaff@programming.devF This user is from outside of this forum
                                        flagstaff@programming.devF This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by
                                        #19

                                        I am, unfortunately, on Windows, mostly because of my inability to find adequate Linux replacements for key features in AutoHotkey and IrfanView. Believe me, I've been looking and trying to learn...

                                        lunarloony@lemmy.sdf.orgL 1 Reply Last reply
                                        0
                                        • flagstaff@programming.devF [email protected]

                                          I am, unfortunately, on Windows, mostly because of my inability to find adequate Linux replacements for key features in AutoHotkey and IrfanView. Believe me, I've been looking and trying to learn...

                                          lunarloony@lemmy.sdf.orgL This user is from outside of this forum
                                          lunarloony@lemmy.sdf.orgL This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by
                                          #20

                                          I've found XnView to be a good IrfanView replacement. (Granted it's not QUITE as good; same as how there isn't anything quite as good as Notepad++)

                                          As for Lynx on Windows, looks like it's available through Scoop! https://bjansen.github.io/scoop-apps/main/lynx/

                                          flagstaff@programming.devF 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups