▲ | trod1234 6 days ago | ||||||||||||||||||||||||||||||||||
This is quite a rudimentary checklist, and it won't provide much in terms of privacy protections, but it will break a number of sites. The current state of browser-fingerprinting is off-the-rails, where they deny service if they don't get those fingerprints, and the browser to a lesser degree has had its securities/privacy protections gradually degraded. Stock Firefox will not be able to provide any sufficient guarantees. There are patches that need to be re-compiled in, because there have been about:config options removed. I highly suggest you review Arkenfox's work, most of the hardening feature he recommends will provide a better defense than nothing. He regularly also contributes to the Mullvad browser which implements most of his hardening and then some but also has some differentiation from the Tor Browser, but many of the same protections. The TL;DR of the problemscope is that there are artifacts that must be randomized within a certain range. There are also artifacts that must be non-distinct so as to not provide entropy for identification (system fonts and such that are shared among many people in a cohort). JS, and several other components, if its active will negate a lot of the defenses that have been developed to-date. Additionally, it seems that in some regional localities Eclipse attacks may be happening (multi-path transparent MITM), by terminating encryption early or through Raptor. At a bare minimum, there seem to be some bad actors that have mixed themselves into the root pki pool. I've seen valid issued Google Trust certs floating around that were not authorized by the owner of the SAN being visited, and it was transparent and targeted to that blog, but its also happened with vendors (providing VOIP related telco services). It seems Some ISPs may be doing this to collect sensitive data for surveillance capitalism or other unknown malign purposes. In either case TLS can't be trusted. | |||||||||||||||||||||||||||||||||||
▲ | ranger_danger 6 days ago | parent | next [-] | ||||||||||||||||||||||||||||||||||
> JS, and several other components, if its active will negate a lot of the defenses that have been developed to-date. I thought if you disabled JS, then that would greatly narrow down which user on the internet you are, since very few people (in comparison to everyone else in the world) actually do this. > not authorized by the owner of the SAN being visited Source? > TLS can't be trusted Do you have more info on this? Why are more people not worried about it? | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
▲ | michaelt 6 days ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||
> I've seen valid issued Google Trust certs floating around that were not authorized by the owner of the SAN being visited Did you confirm with the owner that they were unauthorized? And can you point to the certificates in the Certificate Transparency logs? | |||||||||||||||||||||||||||||||||||
|