I just tried the Am I Unique site and I'm surprised by the amount of information the sites can have. Why do they know if I'm connected using 4G or 5G for example? Even using a privacy browser
Privacy
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
no shit
I use VPN because of the ISP and the network, not to become anonymous to the websites I visit.
unless it's about geo restrictions.
Ultimately being truly anonymous on the internet is pretty hard, and thus VPNs are mostly helpful for getting around region blocks for streaming services, not for obtaining more privacy.
I disagree.
There seems to constantly be two sides of the privacy discussion with public VPN options and they're both wrong on their own. It's correct that using a VPN on its own is not enough to keep you private online, fingerprinting being one example to why. However, not using a VPN but having no identifiable browser fingerprint doesn't either, since your IP is still a fingerprint too.
I like to give the following analogies:
- Doing only an oil change on your vehicle but no other maintenance won't keep your vehicle running forever
- Doing all vehicle maintenances except oil changes won't keep your vehicle running forever
If the goal is to be private, remember that a VPN is only one tool in a very large tool belt.
I think TOR would be more suitable than a VPN
Tor is definitely another option. For my personal use however, I have my entire network covered by a VPN so all outgoing traffic uses it.
I'm sure I could setup Tor to do the same, but I imagine my family and I would get blocked more heavily on sites, as well as get our bank accounts and such flagged or something.
Like many things, it obviously depends on your threat model.
They do more then fingerpring your browser.
Wait, did they put them on our hands?
Fingerprinting isn't allways synonym of the lack of privacy. But there are differences between fingerprinting for tracking and profiling reasons, which certainly is needed to block or to spoof, and tecnically data needed to show correctly the content of a page, eg the first public IP numbers to show the content in your lenguage, the fonts used, screen resolution, OS, browser engine...., all data which are the same for millon other users. We can block por complete the fingerprinting, but than we'll see that half of the pages are not shown correctly or don't even work. It's always an commitment to set the fingerprint blocking. VPNs add an privacy layer, but dont avoid fingerprintings, used as extension can't avoid that the browser connect first to the ISP before the VPN can create the tunnel, with which it may serve to skip country restrictions, but you are still seen by your ISP. It don't also blocking the fingerprinting, except the IP. To stay private depends more on other measures, DNScrypt, not to use apps, search engines and services which logs/share our activity, using ad/trackerblocker.... and the most important, common sense, not a tin foil hat. PEBCAK
Back in the day there were apps that generated phony web searches to obfuscate your real searches. Seems like there could be tools to mess around and change browser fingerprints periodically. No?
Already done, see: https://github.com/uazo/cromite
When I go to the fingerprint test, a bunch of the values like canvas resolution and timezone are randomized.
...Not everything, though.
Interesting... Tor, Mullvad, and other secure browsers, go to the exact opposite approach, though... they try to make everyone look the same so they can't tell you apart across IPs
Yeah, exactly.
Cromite's explicit focus is, literally, antifingerprinting. With the goal of breaking cross site tracking I guess.
A more accurate goal for Tor/Mullvad is anonymizing, e.g. “blending in with the crowd.”
It’s like radically changing your clothes every day vs wearing super incognito stuff. Different means, each more optimal for different aspects of security/privacy.
It could be done on the browser level (maybe it's something browsers like LibreWolf do), however, it would break sites that require the fingerprints to be the same for "security reasons" which may or may not be a legitimate claim.
You could say "well, I'm not going to use that particular website then", but the problem is that there are less and less websites that don't require these technologies to function properly.
Can you give an example of one of those websites?
Off the top of my head, no. What I do remember is that I couldn't use Librewolf as my daily browser because I had trouble using every other website. Might be an exaggeration, and it could have been due to other factors, not just resisting fingerprinting.
I've just come across this article: https://kevinboone.me/fingerprinting.html
The author describes the situation pretty well:
you enable fingerprinting resistance in Firefox, or use Librewolf, you’ll immediately encounter oddities. Most obviously, every time you open a new browser window, it will be the same size. Resizing the window may have odd results, as the browser will try to constrain certain screen elements to common size multiples. In addition, you won’t be able to change the theme.
You’ll probably find yourself facing more ‘CAPTCHA’ and similar identity challenges, because your browser will be unknown to the server. Websites don’t do this out of spite: hacking and fraud are rife on the Internet, and the operators of web-based services are rightly paranoid about client behaviour.
You’ll likely find that some websites just don’t work properly, in many small ways: wrong colours, misplaced text, that kind of thing. I’ve found these issues to be irritations rather than show-stoppers, but you might discover otherwise.
There's this but it blocks only one of the many methods voyeurs use.
https://addons.mozilla.org/en-US/firefox/addon/no-canvas-fingerprinting/
And Canvas Blocker (which only optionally blocks but randomizes them). But Firefox has that built-in now; canvas fingerprinting should be pretty much useless there.
There is a browser extension called Chameleon that will spoof a fair amount of data, but after testing it against one of those fingerprint test sites, it looks like it doesn't/can't spoof everything.
Doesn't browser with anti-fingerpriting give the same settings to everyone using that browser so they all look like the same person?
Yes and I think that's kinda dumb. It's never going to be possible to have everyone look the same. I would go the other route. Randomize everything everytime so you never leave twice the same fingerprints. That's way easier and it polutes marketers dabases, which is a double win.
If you are using a popular VPN I guess that's an option, but if you are going through the onion, where several nodes are being monitored, being the only guy that looks different, regardless if each time is a different different, just makes you too easy to be tracked :P
But VPNs aren't supposed to make you anonymous.
They secure your data while in transit to/from the exit node. Maybe that's your job so you can access their LAN. Or it's a public VPN that secures your dada from the local WiFi or ISP you're directly connected to. That's all it's built for.
And what do you thing HTTPS does exactly? Whe the web was HTTP sure VPN's had a point as people on public wifi could sniff your trafic. Now they can't.
It only encrypts the data within the HTTPS packet. But where that packet is going is still transparent.
It also doesn't do anything for non web traffic. Email through SMTP or IMAP, FTP, lots of things don't use HTTP at all.
Here are some extra tips for increased privacy:
- Don´t use your browser in fullscreen
- Download Chameleon for Firefox, it periodically changes the browser and OS it pretends to be
OR: Use Chameleon and set yourself to the most common combo. Get lost in the noise.
Why no full screen? The second point makes sense and I might go back to using FF, but I can fathom what not going full screen accomplishes.
look at my reply on the other comment :)
Thanks! I had no idea. I figured the resolution came from system specs. This is good to know. Although, I’m super close to just banishing the internet entirely. Tracking is getting out of hand…
Edit: corrected “vanishing” to “banishing.” Autocorrect. 🙄
What's the issue with full screen?
randomlzing your window size shows trackers different resolutions.
depending on which OS you use it won't show 1920x1080, as taskbars and other extras take off a few pixels.
example: if your browser is fullscreen and only shows a resolution of 1920x1075 it could most likely mean you use macos (randomly chosen)
Librewolf has letterboxing which locks your website's intrinsic size to specific resolutions (like 1600x1000) to combat this
Oh shit
Just use Tor or Mullvad browser (you don't need to use the Tor Network or Mullvad VPN, you can bring your own).
That said the wasted screen real-estate is a dealbreaker for me. So if I'm not gonna log in then I'll go with a fully separate installation.