Which is best at mitigating browser fingerprinting? Firefox (with or without arkenfox)? Librewolf? Mullvad browser?
-
This has been my experience as well. What tweaks are you making to default librewolf?
uBlock:
-
Change uBlock blocking mode to Medium or Hard per their Github wiki. Can cause site breakage on shitty websites (eg sites that import large JS libraries from remote sources).
-
Enable filterlist Privacy>Block Outside Intrusion to LAN (Access to LAN is used to fingerprint or by threat actors during reconnaissance phase of hacking)
-
Consider enabling other filterlists included in uBlock.
Librewolf:
-
Enable limiting of referrers under
LibreWolf Preferences>Privacy>Limit cross-origin referers
-
Enable letterboxing under
LibreWolf Preferences>Fingerprinting>Enable letterboxing
-
-
This has been my experience as well. What tweaks are you making to default librewolf?
Neptr covered it better than I could've
-
Tor is off the table for me because it's so slow. If you can point to some test sites or documentation that supports your choice, please include!
Have you tried daily driving tor recently? You can certainly get slow speeds still, but in my experience recently they're generally not too bad most of the time, especially for things coming out of the major CDNs.
-
Tor is off the table for me because it's so slow. If you can point to some test sites or documentation that supports your choice, please include!
Use this site to test your uniqueness in different browsers and VPN setups:
https://abrahamjuliot.github.io/creepjs/
I have found that Mullvad Browser + VPN (with DAITA and Multihop ON) are better than FireFox or LibreWolf. Me and another user on here went through a little back and forth comparing some things. Just follow the comment thread from here:
https://programming.dev/comment/15090531
(take it with a grain of salt and DYOR, we are not experts)
Also, I love Tor, but another reason to be careful: exit nodes can be run by anyone, including bad actors and any 3-letter agency in the world. At the very least, add a VPN layer when using Tor.
-
Neptr covered it better than I could've
The more plugins you add, the more unique you become, just FYI.
-
It takes like 1 minute. How often do you reset your system?
Distro hopping from time to time. So enough to be familiar with the process...
-
Tor is off the table for me because it's so slow. If you can point to some test sites or documentation that supports your choice, please include!
Its is pretty easy to get rid of all the brave crap. You just need a policy file:
# cat /etc/brave/policies/managed/brave_policies.json { "BraveRewardsDisabled": true, "BraveWalletDisabled": true, "BraveVPNDisabled": 1, "BraveAIChatEnabled": true, "NewTabPageLocation": "https://search.brave.com/", "TorDisabled": false, "PasswordManagerEnabled": false, "DnsOverHttpsMode": "automatic" }
-
The more plugins you add, the more unique you become, just FYI.
Womp womp
-
Tor is off the table for me because it's so slow. If you can point to some test sites or documentation that supports your choice, please include!
Mullvad and it isn't close. I use it to circumvent bans on social media when I say something too communist
-
Use this site to test your uniqueness in different browsers and VPN setups:
https://abrahamjuliot.github.io/creepjs/
I have found that Mullvad Browser + VPN (with DAITA and Multihop ON) are better than FireFox or LibreWolf. Me and another user on here went through a little back and forth comparing some things. Just follow the comment thread from here:
https://programming.dev/comment/15090531
(take it with a grain of salt and DYOR, we are not experts)
Also, I love Tor, but another reason to be careful: exit nodes can be run by anyone, including bad actors and any 3-letter agency in the world. At the very least, add a VPN layer when using Tor.
For the record you can exclude certain countries from your tor options. I am of the opinion that most people aren't going to need to avoid government stuff, but if you do, exclude, say, 5 eyes countries if you live in one.
-
Tor is off the table for me because it's so slow. If you can point to some test sites or documentation that supports your choice, please include!
Can't someone come up with a browser that just randomly lies when asked about the characteristics that could be used for fingerprinting?
Except for trusted, whitelisted sites.
That seems like it would be a pretty good privacy enhancer.
-
Tor is off the table for me because it's so slow. If you can point to some test sites or documentation that supports your choice, please include!
You need to use or spoof a browser that is used by a lot of people, and have a screen resolution (or spoof) that is common (like 1920x1080), and set the browser to only use basic fonts like times new roman, consolas. Avoid sites that use canvas, or install a canvas blocker, which basically ignores this html element when loading the page. Mitigating fingerprinting is about blending in
-
Can't someone come up with a browser that just randomly lies when asked about the characteristics that could be used for fingerprinting?
Except for trusted, whitelisted sites.
That seems like it would be a pretty good privacy enhancer.
It would really stand out.
-
I don't think many people here use Brave Browser because of their crypto referral program, but they've made strides at mitigating fingerprinting. I use Brave Browser on my PC and Android and never had an issue.
Brave is a series scam company.
-
Tor is off the table for me because it's so slow. If you can point to some test sites or documentation that supports your choice, please include!
Mullvad browser
-
Mullvad and it isn't close. I use it to circumvent bans on social media when I say something too communist
Facebook doesn't care about vpns or fake users/accounts because it drives enfagement.
-
It would really stand out.
It would produce something completely different every time.
You either need to be indistinguishable from everyone else, or indistinguishable from your last page load.
-
Its is pretty easy to get rid of all the brave crap. You just need a policy file:
# cat /etc/brave/policies/managed/brave_policies.json { "BraveRewardsDisabled": true, "BraveWalletDisabled": true, "BraveVPNDisabled": 1, "BraveAIChatEnabled": true, "NewTabPageLocation": "https://search.brave.com/", "TorDisabled": false, "PasswordManagerEnabled": false, "DnsOverHttpsMode": "automatic" }
Yeah but i don't want to recommend a browser to someone just for them to have some cryptocurrency, AI chatbot, and Ad reward program shoved in their face.
And then telling them that they Can get rid of it, they just have to go make some file they don't understand in a location on their hard drive they've never been to.
Because being real, if Brave's bloat was bundled into an antivirus software, it would rightfully raise red flags for anyone with standard computer literacy.
-
Yeah but i don't want to recommend a browser to someone just for them to have some cryptocurrency, AI chatbot, and Ad reward program shoved in their face.
And then telling them that they Can get rid of it, they just have to go make some file they don't understand in a location on their hard drive they've never been to.
Because being real, if Brave's bloat was bundled into an antivirus software, it would rightfully raise red flags for anyone with standard computer literacy.
well yeah I guess some decide to make revenue with this "shady" practices like brave does and others just take 400 millions from google.
-
Can't someone come up with a browser that just randomly lies when asked about the characteristics that could be used for fingerprinting?
Except for trusted, whitelisted sites.
That seems like it would be a pretty good privacy enhancer.
Not sure about the whitelisting part, but I think this is what Brave already does. Randomizing fingerprinted data as opposed to blending in. Makes it hard to build a profile on.