Remix.run Logo
nilslindemann 6 days ago

Notice, if you have all these settings enabled, you can still be fingerprinted. Test here:

https://fingerprint.com/

In my tests only Tor was able to prevent that, but using Tor will give you bad rankings on payment sites like PayPal, you may even get banned there.

I learned this from here:

https://news.ycombinator.com/item?id=35243355

That site is now black, surely a coincidence. Here the archive.org link:

https://web.archive.org/web/20250801173508/https://www.bites...

Have a local copy.

LeoPanthera 5 days ago | parent | next [-]

> fingerprint dot com

Is this an ad? Of all the things I was expecting to see when I clicked that, "Contact Sales" was not one of them.

styanax 5 days ago | parent [-]

Use the EFF version, it's been around a long time: https://coveryourtracks.eff.org/

4gotunameagain 6 days ago | parent | prev | next [-]

https://amiunique.org/ is scary.

neandrake 5 days ago | parent | prev | next [-]

Looks like the source to Bitestring's blog is still up, maybe domain registration just lapsed?

https://github.com/bitestring/bitestring.github.io/blob/main...

mzajc 5 days ago | parent | prev [-]

AFAIK none of these check for changing fingerprints. Your browser could report a very unique screen resolution, but could be configured to change it periodically. How much does that fool fingerprinting algorithms?

nilslindemann 5 days ago | parent [-]

I guess it would, but the problem of getting "bad karma" points on payment processors, etc. remains.

Further, this is not the only form of fingerprinting, there is also e.g. TLS fingerprinting [1].

Programmers should tell people that browsers and the internet are not private, and that everyone who claims otherwise does not tell the truth.

There should be more discussions between people more skilled than me, if and how such methods can be prevented. And that should be documented well. Including how to prevent getting blocked on sites.

A creative attempt would be when millions or billions of users have a software (self chosen!) which randomly visits sites, when the computer is not busy. This would not prevent fingerprinting, but the collected data would be useless (Someone in the other thread suggested that).

Another method would be to declare it illegal and require workers to report such methods to the authorities.

[1] https://roundproxies.com/blog/what-is-tls-fingerprint/