167 points

So I guess for Firefox users it’s time to enable the resist fingerprinting option ? https://support.mozilla.org/en-US/kb/resist-fingerprinting

permalink
report
reply
88 points
*

You can also use canvas blocker add-on.

Use their containers (firefox multi-account container add-on) feature and make a google container so that all google domains go to that container.

If you want to get crazy, in either set in about:config or make yourself a user.is file in your Firefox profile directory and eliminate all communication with google. And some other privacy tweaks below.

google shit and some extra privacy/security settings

Google domains and services:

user_pref(“browser.safebrowsing.allowOverride”, false);
user_pref(“browser.safebrowsing.blockedURIs.enabled”, false);
user_pref(“browser.safebrowsing.downloads.enabled”, false);
user_pref(“browser.safebrowsing.downloads.remote.block_dangerous”, false);
user_pref(“browser.safebrowsing.downloads.remote.block_dangerous_host”, false);
user_pref(“browser.safebrowsing.downloads.remote.block_potentially_unwanted”, false):
user_pref(“browser.safebrowsing.downloads.remote.block_uncommon”, false);
user_pref(“browser.safebrowsing.downloads.remote.enabled”, false);
user_pref(“browser.safebrowsing.downloads.remote.url”, “”);
user_pref(“browser.safebrowsing.malware.enabled”, false);
user_pref(“browser.safebrowsing.phishing.enabled”, false);
user_pref(“browser.safebrowsing.provider.google.advisoryName”, “”);
user_pref(“browser.safebrowsing.provider.google.advisoryURL”, “”);
user_pref(“browser.safebrowsing.provider.google.gethashURL”, “”);
user_pref(“browser.safebrowsing.provider.google.lists”, “”);
user_pref(“browser.safebrowsing.provider.google.reportURL”, “”);
user_pref(“browser.safebrowsing.provider.google.updateURL”, “”);
user_pref(“browser.safebrowsing.provider.google4.advisoryName”, “”);
user_pref(“browser.safebrowsing.provider.google4.advisoryURL”, “”);
user_pref(“browser.safebrowsing.provider.google4.dataSharingURL”, “”);
user_pref(“browser.safebrowsing.provider.google4.gethashURL”, “”);
user_pref(“browser.safebrowsing.provider.google4.lists”, “”);
user_pref(“browser.safebrowsing.provider.google4.pver”, “”);
user_pref(“browser.safebrowsing.provider.google4.reportURL”, “”);
user_pref(“browser.safebrowsing.provider.google4.updateURL”, “”);

Privacy and security stuff:

user_pref(“dom.push.enabled”, false);
user_pref(“dom.push.connection.enabled”, false);

user_pref(“layout.css.visited_links_enabled”, false);
user_pref(“media.navigator.enabled”, false);

user_pref(“network.proxy.allow_bypass”, false);
user_pref(“network.proxy.failover_direct”, false);
user_pref(“network.http.referer.spoofSource”, true);

user_pref(“security.ssl.disable_session_identifiers”, true);
user_pref(“security.ssl.enable_false_start”, false);
user_pref(“security.ssl.treat_unsafe_negotiation_as_broken”, true);
user_pref(“security.tls.enable_0rtt_data”, false);

user_pref(“privacy.partition.network_state.connection_with_proxy”, true);

user_pref(“privacy.resistFingerprinting”, true);
user_pref(“privacy.resistFingerprinting.block_mozAddonManager”, true);
user_pref(“privacy.resistFingerprinting.letterboxing”, true);
user_pref(“privacy.resistFingerprinting.randomization.daily_reset.enabled”, true);
user_pref(“privacy.resistFingerprinting.randomization.enabled”, true);

user_pref(“screenshots.browser.component.enabled”, false);

user_pref(“privacy.spoof_english”, 2);

user_pref(“webgl.enable-debug-renderer-info”, false); user_pref(“webgl.enable-renderer-query”, false);

permalink
report
parent
reply
31 points

This is why I like Lemmy, never knew canvas blocker was a thing. Thank you.

permalink
report
parent
reply
24 points

Or you just switch to LibreWolf where all these settings are already set. It even comes with uBlock preinstalled.

permalink
report
parent
reply
9 points

I’m still trying to wrap my head around fingerprinting, so excuse my ignorance. Doesn’t an installed plugin such as Canvas Blocker make you more uniquely identifiable? My reasoning is that very few people have this plugin relatively speaking.

permalink
report
parent
reply
2 points

Maybe if they can connect you to your other usage but it’s probably more of their resources and such a small % of the population that it isn’t worth the time to subvert? Idk just guessing here

permalink
report
parent
reply
2 points

Iirc, Websites can’t query addons unless those addons manipulate the DOM in a way that exposes themselves.

They can query extensions.

Addons are things installed inside the browser. Like uBlock, HTTPS Everywhere, Firefox Containerr, etc.

Extensions are installed outside the browser. Such as Flashplayer, the Gnome extensions installer, etc.

permalink
report
parent
reply
1 point

I use (and love) Firefox containers, and I keep all Google domains in one container. However, I never know what to do about other websites that use Google sign in.

If I’m signing into XYZ website and it uses my Google account to sign in, should I put that website in the Google container? That’s what I’ve been doing, but I don’t know the right answer.

permalink
report
parent
reply
5 points

Yes, that’s right. Also seriously consider ditching Single StalkSign On entirely.

permalink
report
parent
reply
18 points

Why does it do this?

  • Math operations in JavaScript may report slightly different values than regular.

PS grateful for this option!

permalink
report
parent
reply
21 points

Some math functions have slightly different results depending on architecture and OS, so they fuzz the results a little. Here’s a tor issue discussing the problem: https://gitlab.torproject.org/legacy/trac/-/issues/13018

permalink
report
parent
reply
6 points

But one question I’ve been asking myself is : then, wouldn’t I be fingerprinted as one of the few nerds who activated the resist fingerprinting option?

permalink
report
parent
reply
15 points

I’ve used this. The only annoyance is that all the on-screen timestamps remain in UTC because JS has no idea what timesone you’re in.

I get that TZ provides a piece of the fingerprint puzzle, but damn it feels excessive.

permalink
report
parent
reply
13 points

And automatic darkmode isn’t respected, and a lot of other little annoyances. That’s why this is so difficult. These are all incredibly useful features we would have to sacrifice for privacy.

permalink
report
parent
reply
1 point

Dark mode can be recreated using extensions, although the colors most likely won’t be as legible as “native support”.

I don’t see why a similar extrnsion couldn’t change the timezones of clocks.

Additionally, I don’t see why the server should bother with either (pragmatically) - Dark mode is just a CSS switch and timezones could be flagged to be “localized” by the browser. No need for extra bandwidth or computing power on the server end, and the overhead would be very low (a few more lines of CSS sent).

Of course, I know why they bother - Ad networks do a lot more than “just” show ads, and most websites also like to gobble any data they can.

permalink
report
parent
reply
3 points

Wait is that why my Firefox giving me errors when I try to log into websites with 2FA?

permalink
report
parent
reply
13 points
*

I mean it doesn’t hurt but as far as I can tell, it doesn’t actually block fingerprinting, it blocks domains known to collect and track your activity. The entire web is run on Google domains so that would be nearly impossible to block.

The crazy part about fingerprinting is that if you block the fingerprint data, they use that block to fingerprint you. That’s why the main strategy is to “blend in”.

permalink
report
parent
reply
4 points

The crazy part about fingerprinting is that if you block the fingerprint data, they use that block to fingerprint you. That’s why the main strategy is to “blend in”.

So, essentially the best way to actually resist fingerprinting would be to spoof the results to look more common - for example when I checked amiunique.org one of the most unique elements was my font list. But for 99% of sites you could spoof a font list that has the most common fonts (which you have) and no others and that would make you “blend in” without harming functionality. Barring a handful of specific sites that rely on having a special font, that might need to be set as exceptions.

permalink
report
parent
reply
1 point

No, the best way is to randomly vary fingerprinting data, which is exactly what some browsers do.

Font list is just one of a hundred different identifying data points so just changing that alone won’t do much.

permalink
report
parent
reply
8 points

Privacy Badger anyone?

permalink
report
parent
reply
7 points

But does privacy badger also act on the canvas APIs & cie. ?

permalink
report
parent
reply
7 points

It annoys me that this is not on by default…

permalink
report
parent
reply
14 points

It’s a nice feature for those that actively enable it and know that it’s enabled, but not for the average user. Most people never change the default settings. Firefox breaking stuff by default would only decrease their market share even further. And this breaks so much stuff. Weird stuff. The average user wants a browser that “just works” and would simply just switch back to Chrome if their favourite website didn’t work as expected after installing Firefox. Chrome can be used by people who don’t even know what a browser is.

permalink
report
parent
reply
6 points

Does ublock do this?

permalink
report
parent
reply
2 points

No

permalink
report
parent
reply
1 point

Please don’t enable this blindly. A lot of modern websites depend on a bunch of features which will simply not work with that flag enabled. Only do it, if you’re willing to compromise and debug things a bit

permalink
report
parent
reply
131 points

So, manifest v3 was all about preventing Google’s competitors from tracking you so that Google could forge ahead.

permalink
report
reply
66 points
*

It was never about privacy, it was supposedly about security, which there is some evidence for. There were a lot of malicious extensions. The sensible thing to do would be to crack down on malicious extensions but I guess that costs too much money and this method also conveniently partially breaks adblockers.

permalink
report
parent
reply
16 points

The fewer of your competitors who have the data the more valuable that data is.

permalink
report
parent
reply
74 points
*

This has been the case for years. I develop fingerprinting services so AMA but it’s basically a long lost battle and browser are beyond the point of saving without a major resolution taking place.

The only way to resist effective fingerprint is to disable Javascript in its entirity and use a shared connection pool like wireguard VPN or TOR. Period. Nothing else works.

permalink
report
reply
17 points

How can you live with yourself?

permalink
report
parent
reply
22 points

I do it as a security measure for private institutions and everyone involved has signed contracts. It’s not on the public web.

permalink
report
parent
reply
6 points

I know right. I was offered a job at a betting site and online casino with those addictive games and shit. Gave that a hard pass, said no thanks, don’t think that’s the right business area for me. I would feel so dirty going to and coming from work every damn day.

permalink
report
parent
reply
15 points
*

Hello grease monkey and no script, my old friends

permalink
report
parent
reply
6 points

What are some good scripts for grease monkey?

permalink
report
parent
reply
5 points

Wouldn’t selective disabling of JavaScript make fingerprinting easier? Your block and white list are likely to be unique.

permalink
report
parent
reply
1 point

Tracking scripts are usually separate from the scripts that do stuff. But also giving them less info is always just better.

permalink
report
parent
reply
10 points

Disabling JavaScript entirely is another data point for fingerprinting. Only a tiny fraction of users do it.

Besides, without JavaScript most websites are not functional anymore. Those that are are likely not tracking you much in the first place.

permalink
report
parent
reply
6 points

Yeah unfortunately disabling JS is not viable option tho onion websites are perfectly functional without JS and it just shows how unnecessarily JS had been expanded without regard for safety but theres no stopping the web.

permalink
report
parent
reply
3 points

I disable JS with noscript.net and it really is an enormous pain. It has some security advantages, like I don’t get ambushed so easily by an unfamiliar site and pop ups. I often will just skip a site if it seems too needy

permalink
report
parent
reply
7 points

This is what I’ve been saying for months in the reddit privacy sub and to people IRL. Some people seem perfectly happy to just block ads so they don’t see the tracking. Literal ignorance is bliss. Most simply don’t have time or wherewithal to do the minimal work it takes to enjoy relative “privacy” online.

FWIW, any VPN where you can switch locations should do the job since the exit node IPs ought to get re-used. My practice is to give BigG a vanilla treat because my spouse hasn’t DeGoogled, and leave anything attached to our real names with location A. Then a whole second non-IRL-name set of accounts usually with location B with NoScript and Chameleon. Then anything else locations C, D, E, etc.

Ugh… This all sucks.

permalink
report
parent
reply
5 points

What are you people trying to hide ??? /s

permalink
report
parent
reply
3 points

So… how effective is it? The fingerprinting. I’m guessing there are studies? Also don’t know whether there’s been legal precedent, ie whether fingerprinting has been recognized as valid means of user identification in a court case.

permalink
report
parent
reply
4 points
*

It’s super effective but there are very few real use cases for it outside of security and ad tracking. For example you can’t replace cookies with it because while good fingerprint is unique it can still be fragile (browser update etc.) which would cause data loss and require reauth.

Usually fingerprint plays a supporting role for example when you do those “click here” captchas that’s actually just giving the browser time to fingerprint you and evaluate your trust to decide whether to give you a full captcha or let you through. So fingerprint is always there in tbe background these days tho mostly for security and ad tracking.

As for court cases and things like GDPR - the officials are still sleeping on this and obviously nobody wants to talk about it because it’s super complex and really effective and effects soo many systems that are not ad tech.

permalink
report
parent
reply
2 points

Usually fingerprint plays a supporting role for example when you do those “click here” captchas that’s actually just giving the browser time to fingerprint you and evaluate your trust to decide whether to give you a full captcha or let you through. So fingerprint is always there in tbe background these days tho mostly for security and ad tracking.

I’ve been wondering about those “click here” captchas and their purpose 🤔

permalink
report
parent
reply
73 points

Would it be possible for a browser or extension to just provide false metadata in order to subvert this type of fingerprinting?

permalink
report
reply
61 points
*

So from what I understand, theres 2 common ways that browsers combat this. Someone add to or correct me if I’m wrong.

  1. Browsers such as Mull combat this by looking the same as every other browser. If you all look the same, it’s hard to tell you apart. I believe this is why people recommend using default window size when using Tor.

Ex: Everyone wearing black pants and hoodies with the facemasks. Extremely hard to tell who is who.

  1. Browsers such as Brave randomize metadata that fingerprinting collects so that it’s more difficult to piece it all together and build a trend/profile on someone.

Ex: look like a dog in one place, a cat in another place. They get data for a dog but that doesn’t help build anything if the rest of the data is a cat, hamster, whatever. No way to piece it together to be useful.

In both my examples, there are caveats. Just because everyone dressed the same doesn’t mean someone isn’t taller or shorter, or skinnier or fatter. There can still be tells to help narrow down. Or a cat that barks like a dog suddenly is more linkable to a dog if that makes sense lol.

In other words it still depends user behavior that can contribute to the effectiveness of these tools.

EDIT: got distracted. To answer your question I don’t think so. I think it’s more about user behavior blending in or being randomized. I think the only thing an extension would be able to do is possibly randomize the data but I’m unsure of such an extension yet. These aren’t the only options, these are just ones I’ve read about recently. Online behavior, browswr window size, and I’m sure so much more also goes into it. But every little bit helps and is better than nothing.

EDIT2: Added examples for each for clarity.

permalink
report
parent
reply
11 points
*
Removed by mod
permalink
report
parent
reply
7 points
*

For mobile, yes, development stopped.

However, Mullvad (from the actual VPN folk) for desktop still exists.

https://mullvad.net/en/browser

permalink
report
parent
reply
5 points

Yeah maybe Tor Browser was the better example. Just trying to get the point out lol.

permalink
report
parent
reply
3 points

Yep. It’s fork is called ironfox

permalink
report
parent
reply
5 points

The first point is flawed and even TOR doesn’t execute javascript because it’s impossible to catch everything when you give the server full code running capabilities.

The second point is more plausible but there’s an incredible amount of work to do to fix this. Like, needing to rework browser engines from ground up and removing all of the legacy cruft. Brave is not capable of this and never will be no matter what they advertise because it doesn’t have it’s own engine.

That being said, these tools will get you quite far against commercial fingerprint products especially ones used for Ads but that will also ruin your browser experience as now you’re just solving captchas everywhere 🫠

permalink
report
parent
reply
1 point

Thanks for adding! Could you clarify a bit on the points so I can better understand where I was wrong at?

permalink
report
parent
reply
10 points

No. Anything that executes Javascript will be fingerprinted.

That being said it depends who are you fighting. For common commercial tools like Cloudflare fingerprinter it might work to some extent but if you want to safeguard against more sophisticated fingerprinting then TOR and no JS is the only way to combat this.

The issue is that browsers are so incredibly complex that it’s impossible to patch everything and you’ll just end up getting infinite captchas and break your browsing experience.

permalink
report
parent
reply
8 points

Yes. There is a firefox extension called Chameleon that does this.

permalink
report
parent
reply
3 points

Yes but that metadata is also used to serve you the webpage, so if you spoof it, the page may not load properly.

permalink
report
parent
reply
2 points

Others have mentioned what Firefox/etc do, but another option is a PiHole. If you can’t look up the IP for an advertiser URL, you don’t load the JavaScript to begin with.

permalink
report
parent
reply
61 points
*

Just in time for their prophet, Curtis Yarvin, to be pushing a full-scale surveillance state!

Googlers aren’t on our side. They want to rule. They think being a fucking admin on a server makes them cut out to run society.

They want to tear down democracy and basically replace it with administrator rules and access control lists.

permalink
report
reply
5 points
*

Googlers aren’t on our side

They never were, out interests just aligned while they were growing market share. They have that now, so there’s no more reason to stay aligned.

Corporations aren’t your friend, but they can be momentary allies. People should’ve bailed once IE was dethroned, but here we are…

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


Community stats

  • 18K

    Monthly active users

  • 8.9K

    Posts

  • 227K

    Comments