- cross-posted to:
- privacy@programming.dev
- cross-posted to:
- privacy@programming.dev
On the internet, it’s easy to feel anonymous. If you don’t log in, no one can see who you are; you can even switch to incognito mode. The more savvy user would say that’s not really enough. To be anonymous, you need to clear your cookies and use a privacy-oriented browser.
But new research shows even that doesn’t work anymore. Websites are still tracking you — silently, persistently, and without your consent — by reading your browser’s unique “fingerprint.”
Librewold + ublock origin + canvas blocker in help to u
NoScript
It will be annoying to use AT FIRST. One you have it set up for all your sites it won’t be so bad.
No script cannot protect u from on websites which require js for work and thus it cannot protect u from creepjs things and so it required to spoof everything from resolution to os fingerprints
Yes, but it blocks many external scripts from running in the first plce. Like, a LOT. Some websites try to pull from 20 external sites when only one or two are needed to run the site’s functionality. You get fine control, and also get the no-JS experience first.
Tor Browser. You just described part of a fingerprint, tbb is a more common print.
I don’t trust for browser if honestly https://blog.torproject.org/new-release-tor-browser-145/
Before they were spoofing user agent now not hidding
i thought librewolf already has some canvas fingerprint blocking?
It does. You may need to enable it.
Yes it does ,but canvas blocker doing much more advance blocking also u can change a lot parameters in there for faking
Thanks, maybe CanvasBlocker will be less breaking than JShelter. By the way, I recommend AdNauseam, which is a uBlock Origin fork that clicks the ads before hiding them (and without loading their results, so it takes no extra data) to confound advertisers with garbage data.
Plus Mullvad VPN.