Compare to cookies. I use two extensions. The first accepts all cookies to bypass cookie banners. The second deletes all non white listed cookies on closing the page. This works well for me since I seldom have more than 20 pages open, and I constantly close them.

Is there a way to avoid browser fingerprinting like this at all (with potential qol benefits) or am I extra screwed because I do things like this in addition to running Linux on a computer I built?

  • 🕸️ Pip 🕷️@slrpnk.net
    link
    fedilink
    arrow-up
    2
    ·
    6 hours ago

    So I’ve decided that trying to remove fingerprints completely is pointless, pretty difficult and overall unpleasant to deal with. What I think might be the better alternative is using extensions like Canvas Defender which give random fake values to the sites trying to fingerprint you.

    Do be aware though, this means that coveryourtracks cannot give you an accurate look at how well you’re protected, because in this case you’ll want to have a unique fingerprint every time you surf the web. Attempts to block are unsuccessful most of the time, but overwhelming with information and random data feels like the way to go for now.

  • treadful@lemmy.zip
    link
    fedilink
    English
    arrow-up
    28
    ·
    edit-2
    21 hours ago

    Couple interesting resources:

    These mostly just tell you how fucked you are though. The latter has some resources about how to deal with it, but it’s not that useful. The former is really good at breaking down the datapoints that are fucking you.

    A lot of this stuff isn’t really something I’d want to remove, too. Like javascript knowing the viewport size or my timezone. Frustrating.

    Edit to add: Found this as well which has some good info for configuring Firefox. Some things seem extreme to me, but it’s quite informative. https://avoidthehack.com/firefox-privacy-config

      • dormedas@lemmy.dormedas.com
        link
        fedilink
        arrow-up
        1
        ·
        11 hours ago

        I use LibreWolf and then turn a fair chunk of the mitigations off. It’d be nice to have all the mitigations on, but I started to tire of every site not being dark mode at night, or the time being incorrect, or the JavaScript on the site breaking, or various other things when I don’t really care about the tracking.

        It was also difficult or annoying to turn these mitigations off on a site-by-site basis for known-okay or trusted sites. Maybe someone could educate me, here though.

    • sunzu2@thebrainbin.org
      link
      fedilink
      arrow-up
      2
      ·
      18 hours ago

      Does Mullvad just create random print everytime you get new identity. I think the idea is to just keep switching it

  • CanadaPlus@lemmy.sdf.org
    link
    fedilink
    arrow-up
    5
    ·
    17 hours ago

    Tor Browser is designed to look like every other running Tor Browser on a somewhat-similar screen, if you use it.

        • Xuderis@lemmy.world
          link
          fedilink
          arrow-up
          3
          ·
          5 hours ago

          Keep that using things like ublock and noscript make you stand out like a sore thumb for fingerprinting. I’m definitely NOT saying you shouldn’t use them, just spreading awareness.

          • Maiq@lemy.lol
            link
            fedilink
            arrow-up
            1
            ·
            edit-2
            3 hours ago

            For sure, if way more people used them the fingerprint would get smudged. That being said noscript would break the internet for the average user and degrade their browsing experience so I don’t see mass adoption of that awesome add-on. Ublock however is so simple it should be in everyones add-on list.

            Solid advice though!