• WorldsDumbestMan@lemmy.today
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 days ago

    I don’t bother. I know they know everything about me already, and that I’m not an important person. As such, I wonder why it matters.

  • Phoenixz@lemmy.ca
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 days ago

    Yeah, I have an anti fingerprint extension installed in Firefox, and immediately no Google site will work anymore, all google sessions break with it while most other sites just continue to work.

    I’m working to rid myself completely from Google, my target being that I will completely DNS block all google (and Microsoft and Facebook) domains within a year or so. Wish I could do it faster but I only have a few hours per weekend for this

      • 🅃🅾🅆🅴🄻🅸🄴@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        3 days ago

        Hi, here are the extensions I use in FireFox/Librewolf (all will work in Chromium too, but I don’t recommend Chromium browsers):

        Privacy and Security-focused

        uBlock Origin: A lightweight and efficient wide-spectrum content blocker.

        Decentraleyes: Protects you from tracking through free, centralized content delivery.

        CanvasBlocker: Protects your privacy by preventing websites from fingerprinting you using the Canvas API.

        Ghostery Tracker & Ad Blocker - Privacy AdBlock: Blocks trackers and ads to protect your privacy and speed up browsing. Also has a handy feature that automatically rejects cookies for you.

        KeePassXC-Browser: Integrates KeePassXC password manager with your browser.

        NoScript: Blocks JavaScript, Flash, and other executable content to protect against XSS and other web-based attacks &**(note: you will be required to manually activate javascript on each web page that you visit, but this is a good practice that you should get used to).

        Privacy Badger: Automatically learns to block trackers based on their behavior.

        User-Agent Switcher and Manager: Allows you to spoof your browser’s user-agent string.

        Violentmonkey: A user script manager for running custom scripts on websites (allows you to execute your own JavaScript code, usually to modify how a website behaves or block behavior that you don’t like. VERY useful. Check out greasyfork for UserScripts).

        Other useful extensions (non-privacy/security)

        Firefox Translations: Provides on-demand translation of web pages directly within Firefox.

        Flagfox: Displays a flag depicting the location of the current website’s server.

        xBrowserSync: Syncs your browser data (bookmarks, passwords, etc.) across devices with end-to-end encryption.

        Plasma Integration: Integrates Firefox with the KDE Plasma desktop environment (for linux users).

        • aceshigh@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          3 days ago

          How do these extensions work with ubo?

          On a different note. Your name used to be my nickname lol thanks for that memory.

          • 🅃🅾🅆🅴🄻🅸🄴@lemm.ee
            link
            fedilink
            English
            arrow-up
            0
            ·
            3 days ago

            They work well on desktop and mobile (firefox). As the other replier stated, you may want to avoid using multiple ad blockers (decentraleyes, privacy badger, and ghostery) alongside UBlock; and NoScript’s functionality can be achieved with UBlock.

            Lol the name came from a ironscape clan member from my osrs days. I don’t suppose that’s you?

        • helloyanis@jlai.lu
          link
          fedilink
          English
          arrow-up
          0
          ·
          3 days ago

          Thanks for the list! Although most of the time it’s advised to not use multiple adblocker in tandem, because they might conflict with each other and get detected by the website. For example, uBlock origin has, in its settings, an option to disable JavaScript and in the filter list, an option to block cookie banners “Cookie notices”. But if all of these work for you that’s great!

    • 🅃🅾🅆🅴🄻🅸🄴@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 days ago

      Jokes aside, keep in mind that the idea of fingerprinting is that your computer’s configuration is as unique as a fingerprint (e.g., your monitor is x resolution, you are on this operating system, you are using these following extensions in this browser, you have these fonts on your system).

      Setting your user agent to something super unique is basically shining a spotlight on yourself.

      I recommend this user agent switcher extension (firefox)

    • shortrounddev@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      3 days ago

      Fingerprinting unfortunately uses more than useragent strings. It takes hashes of data in your browser from a javascript context that is not easily masked or removed. For example, it might render a gradient of colors projected onto a curved 3d plane. The specific result of this will create a unique hash for your GPU. They can also approximate your geolocation by abusing the time-to-live information within a TCP packet, which is something you can’t control on the clientside at all. If you TRULY want to avoid tracking by google, you need to block google domains in your hosts file and maybe consider disabling javascript on all sites by default until you trust them. Also don’t use google.

  • Waldschrat@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 days ago

    It would be nice to hammer a manually created fingerprint into the browser and share that fingerprint around. When everyone has the same fingerprint, no one can be uniquely identified. Could we make such a thing possible?

    • Not really. The “fingerprint” is not one thing, it’s many, e.g. what fonts are installed, what extensions are used, screen size, results of drawing on a canvas, etc… Most of this stuff is also in some way related to the regular operation of a website, so many of these can’t be blocked.

      You could maybe spoof all these things, but some websites may stop behaving correctly.

      • Waldschrat@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 days ago

        I get that some things like screen resolution and basic stuff is needed, however most websites don’t need to know how many ram I have, or which CPU I use and so on. I would wish for an opt-in on this topics: So only make the bare minimum available and ask the user, when more is needed. For example playing games in the browser, for that case it could be useful to know how much ram is available, however for most other things it is not.

      • OhNoMoreLemmy@lemmy.ml
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 days ago

        No it isn’t.

        And this is really important. If you go on Google tracked websites without tor, Google will still know it’s you when you use tor, even if you’ve cleared all your cookies.

        Tor means people don’t know your IP address. It doesn’t protect against other channels of privacy attack.

            • Canuck@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              0
              ·
              3 days ago

              Good point, that difference does matter. I guess other browsers like Brave use the Tor Network, and it would be misleading to suggest Brave has good anti-fingerprinting.

              What kind of fingerprint avoidance are you suggesting then that the Tor browser cannot do that makes a difference?

              • sugar_in_your_tea@sh.itjust.works
                link
                fedilink
                English
                arrow-up
                0
                ·
                2 days ago

                If you enable JavaScript, you open Pandora’s box to fingerprinting (e.g. tracking mouse movements, certain hardware details, etc). If you don’t, half (or more) of the internet is unusable.

          • brygphilomena@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            0
            ·
            3 days ago

            It’s been a long while since I looked, but I remember it being a thing in tails to specifically not resize your browser window or only have it full screen to match a ton of other fingerprints.

            Plus since it was a live distro that reset on every reboot it would only have the same fonts and other data as other people using tails. Honestly, I hate that all that info is even available to browsers and web sites at all.

  • Waldschrat@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 days ago

    But why would any browser accept access to those metadata so freely? I get that programming languages can find out about the environment they are operating in, but why would a browser agree to something like reading installed fonts or extensions without asking the user first? I understand why Chrome does this, but all of the mayor ones and even Firefox?

    • pound_heap@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 days ago

      Because the data used in browser fingerprinting is also used to render pages. Example: a site needs to know the size of browser window to properly fit all design elements.

      • ricecake@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 days ago

        Just for an example that isn’t visible to the user: the server needs to know how it can communicate responses to the browser.
        So it’s not just “what fonts do you have”, it also needs to know "what type of image can you render? What type of data compression do you speak? Can I hold this connection open for a few seconds to avoid having to spend a bunch of time establishing a new connection? We all agree that basic text can be represented using 7-bit ASCII, but can you parse something from this millennium?”.

        Beyond that there’s all the parameters of the actual connection that lives beneath http. What tls ciphers do you support? What extensions?

        The exposure of the basic information needed to make a request reveals information which may be sufficient to significantly track a user.

      • Waldschrat@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        3 days ago

        I know that it has that in theory, but my Firefox just reached a lower score on https://coveryourtracks.eff.org/ (which was posted in this threat, thanks!) than a Safari. Firefox has good tracking protection but has an absolute unique fingerprint, was 100% identifiable as the first on the site, as to Safari, which scored a bit less in tracking but had a not unique fingerprint.

          • ILikeBoobies@lemmy.ca
            link
            fedilink
            English
            arrow-up
            0
            ·
            3 days ago

            Apple is doing good on the privacy browser front because it makes the data they collect more valuable

  • Ronno@feddit.nl
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 days ago

    Which is why I had hoped the EU would ban all forms of fingerprinting and non-essential data tracking. But they somehow got lobbied into selecting cookies as the only possible mechanism that can be used, leaving ample room to track using other methods.

      • Ronno@feddit.nl
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 days ago

        Not sure how to effectively do that, but I reckon it would be no different than the cookie mess today. Which unfortunately is, hardly ever. The big GDPR related fines can still apply. Let’s say a data set is leaked that includes tracking data that was not necessary for the service to have, then the company can receive a hefty fine. As long as the fine is larger than the reward, it might not be worth it for the company to track you anymore.

          • Jakule17@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            3 days ago

            The European Commission has fined Apple over €1.8 billion for abusing its dominant position on the market for the distribution of music streaming apps to iPhone and iPad users (‘iOS users’) through its App Store

            EU knows how to get it done

          • ricecake@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            0
            ·
            3 days ago

            If you have reason to believe they are, you explain that reasoning to a court and if the reasoning is sufficiently persuasive the company can be compelled to provide internal information that could show whatever is going on.
            Hiding this information or destroying it typically carries personal penalties for the individuals involved in it’s destruction, as well as itself being evidence against the organization. “If your company didn’t collect this information, why are four IT administrators and their manager serving 10 years in prison for intentionally deleting relevant business records?”

            The courts are allowed to go through your stuff.

  • LeTak@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 days ago

    Using Mullvad Browser + Mullvad VPN could mitigate this a little bit. Because if you use it as intended (don’t modify Mullvad browser after installation) , all Mullvad users would have the same browser fingerprint and IPs from the same pool.

    • hansolo@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 days ago

      The problem is it’s all or nothing. You must foil IP address, fingerprint, and cookies - all three at once.

      Mullvad browser might make your fingerprint look similar to other users, but it’s not common is the problem. Test it with the EFF Cover your tracks site.

      • pound_heap@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 days ago

        And Mullvad is not in business if selling user profiles to advertisers, at least as far as we know

      • TomasEkeli@programming.dev
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        3 days ago

        If you don’t trust anyone the internet (or any net you don’t fully control yourself) is not something you will use.

        Practical security is a matter of threat-modeling and calculated risks.

        Mullvad has a good track record, but if you know of better alternatives that don’t require building it yourself, please share!

      • Eyedust@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 days ago

        Mullvad, (the vpn, I have not tried the browser) uses a single account number as both name and password, no emails. It allows for multiple anonymous payment methods and it’s open source.

        Sliiiiightly more trustworthy than Google imo.

        • Deway@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          3 days ago

          The random dude on the corner is more trustworthy than Google, it’s not that hard to be sadly.

  • Ledericas@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 days ago

    its captcha v3, its the same thing reddit uses to catch bots and ban evaders, apparently its expensive for reddit so they only mostly use it for ban waves.

  • mle@feddit.org
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 days ago

    So I thought this is never going to fly under GDPR. Then the article goes on to say:

    Many privacy laws, including the EU’s GDPR and California’s CCPA, require user consent for tracking. However, because fingerprinting works without explicit storage of user data on a device, companies may argue that existing laws do not apply which creates a legal gray area that benefits advertisers over consumers.

    Oh come on Google, seriously? I remember a time when Google were the good guys, can’t believe how they’ve changed…

    • pulsewidth@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 days ago

      Google were maybe seen as the good guys back in the days of Yahoo search, and perhaps the very early days of Android.

      But those times are so long passed. Google has been a tax-avoiding, anti-consumer rights, search-rigging, anti-privacy behemoth for decades now, and they only get worse with each passing year.

      • mle@feddit.org
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 days ago

        Oh absolutely. At this point I’m not surprised anymore that they turned to shit, it’s more like I think they’ve hit rock bottom already but they manage to surprise me with new ways to dig their hole even deeper.

      • Victor@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 days ago

        It’s still sad to see the development. We’re allowed to mourn things that happened long ago, you know.

    • hansolo@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 days ago

      Ooooh, no they won’t stop this. It’s the workaround for tracking with all the things you just mentioned.

      You have to either mask the fingerprint like how Brave does, or spoof the headers and block JS to make the fingerprint useless.