| ▲ | giobox 17 hours ago | |||||||
The EFF's fingerprint test is nice in that it breaks down a lot of the bits of data used, and lets you know how you compare etc: > https://coveryourtracks.eff.org/ You quickly discover how difficult it really is to avoid a unique fingerprint. Lots of folks in this thread are focusing on DNS and VPN to avoid detection, which of course can help, but a huge number of identifiable bits come from your browser's APIs: User Agent Screen Size and Color Depth System Fonts Hash of canvas fingerprint Hash of WebGL fingerprint WebGL Vendor & Renderer Touch Support AudioContext fingerprint Hardware Concurrency Device Memory Platform Language Timezone Timezone offset Browser Plugin Details etc etc | ||||||||
| ▲ | Scrounger 17 hours ago | parent | next [-] | |||||||
> https://coveryourtracks.eff.org/ I get "Our tests indicate that you have some protection against Web tracking, but it has some gaps." but nothing of too much importance I think. I use a VPN and NextDNS.io. | ||||||||
| ||||||||
| ▲ | Mars008 17 hours ago | parent | prev | next [-] | |||||||
In Tor got: "Our tests indicate that you have you have strong protection against Web tracking." In normal Firefox: "uBlock Origin has prevented the following page from loading: https://eviltracker.net/kcarter-reporting-nojs?a=" In normal Firefox with 'real tracking company' ON (default): "uBlock Origin has prevented the following page from loading: https://trackersimulator.org/kcarter-reporting-nojs" Sort of failed? | ||||||||
| ||||||||
| ▲ | dakolli 17 hours ago | parent | prev [-] | |||||||
Do not trust the EFF !!! | ||||||||