Remix.run Logo
giobox 17 hours ago

The EFF's fingerprint test is nice in that it breaks down a lot of the bits of data used, and lets you know how you compare etc:

> https://coveryourtracks.eff.org/

You quickly discover how difficult it really is to avoid a unique fingerprint.

Lots of folks in this thread are focusing on DNS and VPN to avoid detection, which of course can help, but a huge number of identifiable bits come from your browser's APIs:

User Agent

Screen Size and Color Depth

System Fonts

Hash of canvas fingerprint

Hash of WebGL fingerprint

WebGL Vendor & Renderer

Touch Support

AudioContext fingerprint

Hardware Concurrency

Device Memory

Platform

Language

Timezone

Timezone offset

Browser Plugin Details

etc etc

Scrounger 17 hours ago | parent | next [-]

> https://coveryourtracks.eff.org/

I get "Our tests indicate that you have some protection against Web tracking, but it has some gaps." but nothing of too much importance I think.

I use a VPN and NextDNS.io.

giobox 17 hours ago | parent [-]

The real test is whether the site believes you to be unique, which is listed separately. It reports me as "Our tests indicate that you have strong protection against Web tracking.", but I'm still uniquely identifiable.

Mars008 17 hours ago | parent | prev | next [-]

In Tor got: "Our tests indicate that you have you have strong protection against Web tracking."

In normal Firefox: "uBlock Origin has prevented the following page from loading:

https://eviltracker.net/kcarter-reporting-nojs?a="

In normal Firefox with 'real tracking company' ON (default): "uBlock Origin has prevented the following page from loading:

https://trackersimulator.org/kcarter-reporting-nojs"

Sort of failed?

17 hours ago | parent [-]
[deleted]
dakolli 17 hours ago | parent | prev [-]

Do not trust the EFF !!!