Remix.run Logo
peetistaken 4 hours ago

I built a nice tool to visualize that: https://tls.peet.ws. Its not that secret anymore though, more and more libraries are starting to allow spoofing for browser tls configs. There isnt really a cat/mouse game here - once you match the latest chrome, there is nothing to fingerprint

johnisgood 3 hours ago | parent [-]

I do not think I understand that website. I see that JA3 always gets changed after refresh, but not sure what JA3 is. Why is it always different, and is it good or bad?

Retr0id 3 hours ago | parent [-]

Modern browsers randomise parts of the handshake, which results in an unstable ja3. ja4 and others normalize the relevant details to make the fingerprint constant again.

johnisgood 2 hours ago | parent [-]

How effective is it at "un-anonymizing" me? I value privacy. What do you think I can do about "any" of this?

Retr0id 2 hours ago | parent [-]

It tends to identify your platform/browser version, with relatively low granularity. Unless you have an unusually rare OS/browser config, it won't deanon you on on its own. But it can be combined with other fingerprinting vectors.