| ▲ | kennywinker 5 days ago |
| > This is not true of any web browser because of fingerprinting. Some browsers, like the one you should be using, have anti-fingerprinting tech in them. |
|
| ▲ | jeroenhd 5 days ago | parent | next [-] |
| Anti fingerprinting is nice but if you get served ads based on your IP address you're going to need more than just a browser to escape tracking based advertising. Adblockers aren't good enough when websites you visit use first-party servers to forward data back to ad networks. |
| |
| ▲ | jazzypants 4 days ago | parent | next [-] | | Serving ads based on IP seems foolish when very, very few people have a static IP. I'm sure that a healthy minority of folks on HN do, but we're hardly representative of the general population. | | |
| ▲ | pixl97 4 days ago | parent [-] | | Your IP is a lot more static than you give it credit for. It's not like the dialup era where you get a new IP each time. For example I have a dynamic IP on my cable modem, but it might as well be static as it only changes after there is a long term power outage. Also, it's likely if you're on a home connection most often, then you only have a limited pool of 32k or so IPs, which dramatically lowers the bits of information needed to identify you. | | |
| ▲ | immibis 4 days ago | parent [-] | | European ISPs (at least some) change your IP every day, including IPv6, unless you opt out from the router's configuration page, as a privacy feature. Apparently tracking data of Europeans has a much higher market price. |
|
| |
| ▲ | akimbostrawman 5 days ago | parent | prev [-] | | Mullvad Browser comes with the fingerprint protection of the tor browser and a VPN addon but you do need to pay for there vpn. |
|
|
| ▲ | samtheprogram 5 days ago | parent | prev [-] |
| You didn’t finish my comment. Read the last sentence. Anti-fingerprinting tech just produces a different fingerprint. Google knows e.g. when things are scrambled but certain other things stay the same. |
| |
| ▲ | tojumpship 4 days ago | parent [-] | | Untrue, you can modify it enough to avoid giving it more entropy. Possible approaches include:
- Spoofing browsers down to the TCP stack
- Plausibily random values
- Every possible bit scrambled on each request You can see a similar thought-process behind Tor bridges so it is tried-and-tested. Noted that it is a much more difficult feat to accomplish in a full blown browser rather than network layer. |
|