Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Browsers
Web Extensions
How to make my browsing fingerprint less unique?
Message
<blockquote data-quote="ForgottenSeer 85179" data-source="post: 905024"><p>Good topic!</p><p></p><p>Panopticlick isn't a good test site. It's to slow to test real world tracking as sites wouldn't use such.</p><p>The site also doesn't test much easier tracking ways.</p><p></p><p>Browser extensions doesn't help against fingerprinting as they add unique values to the own data and as they work on client side the server can get around anyway. Example is CNAME.</p><p>Example for bad extension: <a href="https://madaidans-insecurities.github.io/browser-tracking.html" target="_blank">Browser Tracking | Madaidan's Insecurities</a></p><p></p><p>Tor browser make it better then Firefox, Brave but not perfect and also lack sandboxing, CFI and other important security features so it's not recommend for normal surfing.</p><p>Also Daniel Micay say Tor browser user can be still tracked with e.g. CSS.</p><p></p><p>Browser with few user's/ too low market share are too much affected for uniqueness so Chrome is the winner in that case.</p><p>Generally websites only need using the ISP name and combine that with useragent. If then the user change the default browser behaviour with e.g. extensions or blocking Javascript or cookies, this is a 100% identity.</p><p>That's the reason why default browser config are the best and that's the reason why mitigations must be done on browser level</p></blockquote><p></p>
[QUOTE="ForgottenSeer 85179, post: 905024"] Good topic! Panopticlick isn't a good test site. It's to slow to test real world tracking as sites wouldn't use such. The site also doesn't test much easier tracking ways. Browser extensions doesn't help against fingerprinting as they add unique values to the own data and as they work on client side the server can get around anyway. Example is CNAME. Example for bad extension: [URL="https://madaidans-insecurities.github.io/browser-tracking.html"]Browser Tracking | Madaidan's Insecurities[/URL] Tor browser make it better then Firefox, Brave but not perfect and also lack sandboxing, CFI and other important security features so it's not recommend for normal surfing. Also Daniel Micay say Tor browser user can be still tracked with e.g. CSS. Browser with few user's/ too low market share are too much affected for uniqueness so Chrome is the winner in that case. Generally websites only need using the ISP name and combine that with useragent. If then the user change the default browser behaviour with e.g. extensions or blocking Javascript or cookies, this is a 100% identity. That's the reason why default browser config are the best and that's the reason why mitigations must be done on browser level [/QUOTE]
Insert quotes…
Verification
Post reply
Top