Amidst the glossy marketing for VPN services, it can be tempting to believe that the moment you flick on the VPN connection you can browse the internet with full privacy. Unfortunately this is quit…
Damn… I guess the next idea is going offline for good
Back in the day there were apps that generated phony web searches to obfuscate your real searches.
Seems like there could be tools to mess around and change browser fingerprints periodically. No?
Interesting… Tor, Mullvad, and other secure browsers, go to the exact opposite approach, though… they try to make everyone look the same so they can’t tell you apart across IPs
Cromite’s explicit focus is, literally, antifingerprinting. With the goal of breaking cross site tracking I guess.
A more accurate goal for Tor/Mullvad is anonymizing, e.g. “blending in with the crowd.”
It’s like radically changing your clothes every day vs wearing super incognito stuff. Different means, each more optimal for different aspects of security/privacy.
There is a browser extension called Chameleon that will spoof a fair amount of data, but after testing it against one of those fingerprint test sites, it looks like it doesn’t/can’t spoof everything.
It could be done on the browser level (maybe it’s something browsers like LibreWolf do), however, it would break sites that require the fingerprints to be the same for “security reasons” which may or may not be a legitimate claim.
You could say “well, I’m not going to use that particular website then”, but the problem is that there are less and less websites that don’t require these technologies to function properly.
And Canvas Blocker (which only optionally blocks but randomizes them). But Firefox has that built-in now; canvas fingerprinting should be pretty much useless there.
Back in the day there were apps that generated phony web searches to obfuscate your real searches. Seems like there could be tools to mess around and change browser fingerprints periodically. No?
Already done, see: https://github.com/uazo/cromite
When I go to the fingerprint test, a bunch of the values like resolution and timezone are randomized.
…Not everything, though.
Interesting… Tor, Mullvad, and other secure browsers, go to the exact opposite approach, though… they try to make everyone look the same so they can’t tell you apart across IPs
Yeah, exactly.
Cromite’s explicit focus is, literally, antifingerprinting. With the goal of breaking cross site tracking I guess.
A more accurate goal for Tor/Mullvad is anonymizing, e.g. “blending in with the crowd.”
It’s like radically changing your clothes every day vs wearing super incognito stuff. Different means, each more optimal for different aspects of security/privacy.
There is a browser extension called Chameleon that will spoof a fair amount of data, but after testing it against one of those fingerprint test sites, it looks like it doesn’t/can’t spoof everything.
It could be done on the browser level (maybe it’s something browsers like LibreWolf do), however, it would break sites that require the fingerprints to be the same for “security reasons” which may or may not be a legitimate claim.
You could say “well, I’m not going to use that particular website then”, but the problem is that there are less and less websites that don’t require these technologies to function properly.
Can you give an example of one of those websites?
There’s this but it blocks only one of the many methods voyeurs use.
https://addons.mozilla.org/en-US/firefox/addon/no-canvas-fingerprinting/
And Canvas Blocker (which only optionally blocks but randomizes them). But Firefox has that built-in now; canvas fingerprinting should be pretty much useless there.