So I guess for Firefox users it's time to enable the resist fingerprinting option ?
-
So I guess for Firefox users it's time to enable the resist fingerprinting option ? https://support.mozilla.org/en-US/kb/resist-fingerprinting
Does ublock do this?
-
This is why I like Lemmy, never knew canvas blocker was a thing. Thank you.
Or you just switch to LibreWolf where all these settings are already set. It even comes with uBlock preinstalled.
-
I've used this. The only annoyance is that all the on-screen timestamps remain in UTC because JS has no idea what timesone you're in.
I get that TZ provides a piece of the fingerprint puzzle, but damn it feels excessive.
Wait is that why my Firefox giving me errors when I try to log into websites with 2FA?
-
So I guess for Firefox users it's time to enable the resist fingerprinting option ? https://support.mozilla.org/en-US/kb/resist-fingerprinting
Why does it do this?
- Math operations in JavaScript may report slightly different values than regular.
PS grateful for this option!
-
You can also use canvas blocker add-on.
Use their containers feature and make a google container so that all google domains go to that container.
If you want to get crazy, in either set in about:config or make yourself a user.is file in your Firefox profile directory and eliminate all communication with google.
::: spoiler google shit
user_pref("browser.safebrowsing.allowOverride", false);
user_pref("browser.safebrowsing.blockedURIs.enabled", false);
user_pref("browser.safebrowsing.downloads.enabled", false);
user_pref("browser.safebrowsing.downloads.remote.block_dangerous", false);
user_pref("browser.safebrowsing.downloads.remote.block_dangerous_host", false);
user_pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", >
user_pref("browser.safebrowsing.downloads.remote.block_uncommon", false);
user_pref("browser.safebrowsing.downloads.remote.enabled", false);
user_pref("browser.safebrowsing.downloads.remote.url", "");
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("browser.safebrowsing.phishing.enabled", false);
user_pref("browser.safebrowsing.provider.google.advisoryName", "");
user_pref("browser.safebrowsing.provider.google.advisoryURL", "");
user_pref("browser.safebrowsing.provider.google.gethashURL", "");
user_pref("browser.safebrowsing.provider.google.lists", "");
user_pref("browser.safebrowsing.provider.google.reportURL", "");
user_pref("browser.safebrowsing.provider.google.updateURL", "");
user_pref("browser.safebrowsing.provider.google4.advisoryName", "");
user_pref("browser.safebrowsing.provider.google4.advisoryURL", "");
user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
user_pref("browser.safebrowsing.provider.google4.gethashURL", "");
user_pref("browser.safebrowsing.provider.google4.lists", "");
user_pref("browser.safebrowsing.provider.google4.pver", "");
user_pref("browser.safebrowsing.provider.google4.reportURL", "");
user_pref("browser.safebrowsing.provider.google4.updateURL", "");
:::I'm still trying to wrap my head around fingerprinting, so excuse my ignorance. Doesn't an installed plugin such as Canvas Blocker make you more uniquely identifiable? My reasoning is that very few people have this plugin relatively speaking.
-
Why does it do this?
- Math operations in JavaScript may report slightly different values than regular.
PS grateful for this option!
Some math functions have slightly different results depending on architecture and OS, so they fuzz the results a little. Here's a tor issue discussing the problem: https://gitlab.torproject.org/legacy/trac/-/issues/13018
-
I'm still trying to wrap my head around fingerprinting, so excuse my ignorance. Doesn't an installed plugin such as Canvas Blocker make you more uniquely identifiable? My reasoning is that very few people have this plugin relatively speaking.
Maybe if they can connect you to your other usage but it’s probably more of their resources and such a small % of the population that it isn’t worth the time to subvert? Idk just guessing here
-
Or you just switch to LibreWolf where all these settings are already set. It even comes with uBlock preinstalled.
Or Mullvad Browser, which is just the Tor Browser without Tor.
There's also IronFox on Android which is more similar to LibreWolf than MV Browser.
-
Some math functions have slightly different results depending on architecture and OS, so they fuzz the results a little. Here's a tor issue discussing the problem: https://gitlab.torproject.org/legacy/trac/-/issues/13018
But one question I've been asking myself is : then, wouldn't I be fingerprinted as one of the few nerds who activated the resist fingerprinting option?
-
You can also use canvas blocker add-on.
Use their containers feature and make a google container so that all google domains go to that container.
If you want to get crazy, in either set in about:config or make yourself a user.is file in your Firefox profile directory and eliminate all communication with google.
::: spoiler google shit
user_pref("browser.safebrowsing.allowOverride", false);
user_pref("browser.safebrowsing.blockedURIs.enabled", false);
user_pref("browser.safebrowsing.downloads.enabled", false);
user_pref("browser.safebrowsing.downloads.remote.block_dangerous", false);
user_pref("browser.safebrowsing.downloads.remote.block_dangerous_host", false);
user_pref("browser.safebrowsing.downloads.remote.block_potentially_unwanted", >
user_pref("browser.safebrowsing.downloads.remote.block_uncommon", false);
user_pref("browser.safebrowsing.downloads.remote.enabled", false);
user_pref("browser.safebrowsing.downloads.remote.url", "");
user_pref("browser.safebrowsing.malware.enabled", false);
user_pref("browser.safebrowsing.phishing.enabled", false);
user_pref("browser.safebrowsing.provider.google.advisoryName", "");
user_pref("browser.safebrowsing.provider.google.advisoryURL", "");
user_pref("browser.safebrowsing.provider.google.gethashURL", "");
user_pref("browser.safebrowsing.provider.google.lists", "");
user_pref("browser.safebrowsing.provider.google.reportURL", "");
user_pref("browser.safebrowsing.provider.google.updateURL", "");
user_pref("browser.safebrowsing.provider.google4.advisoryName", "");
user_pref("browser.safebrowsing.provider.google4.advisoryURL", "");
user_pref("browser.safebrowsing.provider.google4.dataSharingURL", "");
user_pref("browser.safebrowsing.provider.google4.gethashURL", "");
user_pref("browser.safebrowsing.provider.google4.lists", "");
user_pref("browser.safebrowsing.provider.google4.pver", "");
user_pref("browser.safebrowsing.provider.google4.reportURL", "");
user_pref("browser.safebrowsing.provider.google4.updateURL", "");
:::I use (and love) Firefox containers, and I keep all Google domains in one container. However, I never know what to do about other websites that use Google sign in.
If I'm signing into XYZ website and it uses my Google account to sign in, should I put that website in the Google container? That's what I've been doing, but I don't know the right answer.
-
But one question I've been asking myself is : then, wouldn't I be fingerprinted as one of the few nerds who activated the resist fingerprinting option?
Yes. But it's better than being identified as a unique user which is much more likely without it. You can test it yourself on https://amiunique.org/fingerprint
-
I mean it doesn't hurt but as far as I can tell, it doesn't actually block fingerprinting, it blocks domains known to collect and track your activity. The entire web is run on Google domains so that would be nearly impossible to block.
The crazy part about fingerprinting is that if you block the fingerprint data, they use that block to fingerprint you. That's why the main strategy is to "blend in".
The crazy part about fingerprinting is that if you block the fingerprint data, they use that block to fingerprint you. That’s why the main strategy is to “blend in”.
So, essentially the best way to actually resist fingerprinting would be to spoof the results to look more common - for example when I checked amiunique.org one of the most unique elements was my font list. But for 99% of sites you could spoof a font list that has the most common fonts (which you have) and no others and that would make you "blend in" without harming functionality. Barring a handful of specific sites that rely on having a special font, that might need to be set as exceptions.
-
And automatic darkmode isn't respected, and a lot of other little annoyances. That's why this is so difficult. These are all incredibly useful features we would have to sacrifice for privacy.
Dark mode can be recreated using extensions, although the colors most likely won't be as legible as "native support".
I don't see why a similar extrnsion couldn't change the timezones of clocks.
Additionally, I don't see why the server should bother with either (pragmatically) - Dark mode is just a CSS switch and timezones could be flagged to be "localized" by the browser. No need for extra bandwidth or computing power on the server end, and the overhead would be very low (a few more lines of CSS sent).
Of course, I know why they bother - Ad networks do a lot more than "just" show ads, and most websites also like to gobble any data they can.
-
But one question I've been asking myself is : then, wouldn't I be fingerprinted as one of the few nerds who activated the resist fingerprinting option?
Just use Tor browser if you want to blend in. Some sites will probably not work, and I don't suggest accessing banks with it, but it works well for regular browsing.
-
The crazy part about fingerprinting is that if you block the fingerprint data, they use that block to fingerprint you. That’s why the main strategy is to “blend in”.
So, essentially the best way to actually resist fingerprinting would be to spoof the results to look more common - for example when I checked amiunique.org one of the most unique elements was my font list. But for 99% of sites you could spoof a font list that has the most common fonts (which you have) and no others and that would make you "blend in" without harming functionality. Barring a handful of specific sites that rely on having a special font, that might need to be set as exceptions.
No, the best way is to randomly vary fingerprinting data, which is exactly what some browsers do.
Font list is just one of a hundred different identifying data points so just changing that alone won't do much.
-
No, the best way is to randomly vary fingerprinting data, which is exactly what some browsers do.
Font list is just one of a hundred different identifying data points so just changing that alone won't do much.
I wasn't suggesting it as "font list and you're done". I was using it as an example because it's one where I'm apparently really unusual.
I would think you'd basically want to spoof all known fingerprinting metrics to be whatever is the most common and doesn't break compatibility with the actual setup too much. Randomizing them seems way more likely to break a ton of sites, but inconsistently, which seems like a bad solution.
I mean hypothetically you could also set up exceptions for specific sites that need different answers for specific fields, essentially telling the site whatever it wants to hear to work but that's going to be a lot of ongoing work.
-
I wasn't suggesting it as "font list and you're done". I was using it as an example because it's one where I'm apparently really unusual.
I would think you'd basically want to spoof all known fingerprinting metrics to be whatever is the most common and doesn't break compatibility with the actual setup too much. Randomizing them seems way more likely to break a ton of sites, but inconsistently, which seems like a bad solution.
I mean hypothetically you could also set up exceptions for specific sites that need different answers for specific fields, essentially telling the site whatever it wants to hear to work but that's going to be a lot of ongoing work.
It's a combination of both.
-
I use (and love) Firefox containers, and I keep all Google domains in one container. However, I never know what to do about other websites that use Google sign in.
If I'm signing into XYZ website and it uses my Google account to sign in, should I put that website in the Google container? That's what I've been doing, but I don't know the right answer.
Yes, that’s right. Also seriously consider ditching Single
StalkSign On entirely. -
I'm still trying to wrap my head around fingerprinting, so excuse my ignorance. Doesn't an installed plugin such as Canvas Blocker make you more uniquely identifiable? My reasoning is that very few people have this plugin relatively speaking.
Iirc, Websites can’t query addons unless those addons manipulate the DOM in a way that exposes themselves.
They can query extensions.
Addons are things installed inside the browser. Like uBlock, HTTPS Everywhere, Firefox Containerr, etc.
Extensions are installed outside the browser. Such as Flashplayer, the Gnome extensions installer, etc.
-
Iirc, Websites can’t query addons unless those addons manipulate the DOM in a way that exposes themselves.
They can query extensions.
Addons are things installed inside the browser. Like uBlock, HTTPS Everywhere, Firefox Containerr, etc.
Extensions are installed outside the browser. Such as Flashplayer, the Gnome extensions installer, etc.
Further: the Canvas API doesn’t have any requirements on rendering accuracy.
By deferring to the GPU, font library, etc, tracking code can generate an image that is in most cases unique to your machine.
So blocking the Canvas API would return a 0. Which is less unique than what it would be normally.