Even though i have Proton VPN blocking trackers and use firefox with arkenfox EFF always says my browser has a unique fingerprint. Same with Mullvad browser and Tor. When I switched Tor to “Safer” it said near unique fingerprint, and only when i switched it to safest did it say i am protected from fingerprinting

from my results id guess that it has no fingerprit thanks to no javascript, but 90% of websites are useless without js

    • ssm@lemmy.sdf.org
      link
      fedilink
      arrow-up
      3
      ·
      1 year ago

      Yes, but it’s much better than if you have scripts enabled. Assuming have your useragent set to something common, you’re already covering a lot of ground, and even if you’re not totally fingerprint-proof from every html attribute, every little bit helps.

      • strawberry@kbin.runOP
        link
        fedilink
        arrow-up
        2
        ·
        1 year ago

        oddly enough, when i keep my default ua, it says one in 400 have the same one, but when i change it to chrome running on windows (first one on that website you shared) it says only one in 3000

        though i suppose this may be inaccurate because theres a good chance that firefox users are more likely to use this site than chrome users

        should i just keep it changed to chrome on windows or default?

  • merde alors@sh.itjust.works
    link
    fedilink
    arrow-up
    7
    ·
    edit-2
    1 year ago

    mull: Your browser fingerprint appears to be unique among the 172,086 tested in the past 45 days.

    firefox focus: Your browser fingerprint appears to be unique among the 172,099 tested in the past 45 days.

    tor: Within our dataset of several hundred thousand visitors tested in the past 45 days, only one in 86045.5 browsers have the same fingerprint as yours.

    tor after enabling “request English versions of web pages for enhanced privacy”: Within our dataset of several hundred thousand visitors tested in the past 45 days, only one in 57368.0 browsers have the same fingerprint as yours.

    tor with safest security level: Within our dataset of several hundred thousand visitors tested in the past 45 days, only one in 823.48 browsers have the same fingerprint as yours.

    mull after changing android region to United States: Within our dataset of several hundred thousand visitors tested in the past 45 days, only one in 12294.86 browsers have the same fingerprint as yours.

    changing region doesn’t effect tor, as unlike mull it doesn’t leak system information

  • MajorHavoc@programming.dev
    link
    fedilink
    arrow-up
    6
    ·
    edit-2
    1 year ago

    always says my browser has a unique fingerprint.

    That’s mysterious! It’s hard to entirely smudge away your digital fingerprint, but getting 100% unique match makes me think something important in your setup might be missing.

    Does it say why?

    Do you get the same result in a “Private Browsing” session?

    Are your cookies set to clear automatically?

    If you’re allowing 3rd party cookies, you’re going to have a unique fingerprint 100% of the time. That would certainly do it.

    I can’t think of another reason you would get 100% unique match over and over, though.

    Are you running nightly releases of your browsers? That shouldn’t get 100%, but could if you’re unlucky. Or a big pack for browser plugins that love to announce themselves? I’m grasping at straws now.

    Edit: You can press F12, while in your browser, and find a tab called ‘Network’ to see details of what your browser is sending out about you. Pay particular attention to ‘headers’ and ‘cookies’. If those are too informative, it gives you a unique fingerprint. 99.99% of everyone has a unique digital fingerprint. But some basic techniques, studiously applied, should take you out of that pool.

    Source: Websites have no idea who I am a lot of the time, generally when I choose. I’m clever and well informed, but I’m really just doing the same stuff you find in most short online guides to privacy.

    • listless@lemmy.cringecollective.io
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      If your fingerprint is unique, that means you can’t be confused for someone else.

      That is literally the opposite of anti-fingerprinting.

      You want to look like 1000’s of other people, so they can’t prove it was you that visited a particular site and use that information against you.

      • upto60percentoff@kbin.run
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        If it’s unique every time it means they can’t create a consistent fingerprint for you.

        A UUID assigned to each user is unique, but that’s not useful for tracking unless you can ensure each user keeps the same number across visits.

        • listless@lemmy.cringecollective.io
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 year ago

          The idea with anti-fingerprinting is the idea that no matter who you are or what your setup is, the fingerprint is created, it matches many, many other browsers

          Imagine a sea of people in Guy Fawkes masks.

  • refalo@programming.dev
    link
    fedilink
    arrow-up
    4
    ·
    edit-2
    1 year ago

    possible

    In practice? No not really.

    JShelter is the only thing I have seen that stops creepjs from working at all. But that doesn’t mean you can’t be fingerprinted. Not to mention Crimeflare has been very successful with their TLS fingerprinting methods (among other things), which doesn’t even require working JavaScript.

    And compared to creepjs, EFF’s tool is a joke and works quite differently, and not in a good way.

    • strawberry@kbin.runOP
      link
      fedilink
      arrow-up
      4
      ·
      1 year ago

      my threat model isn’t that extreme lol. just wanna do the best I can with a normal is and browser