I mean it doesn’t hurt but as far as I can tell, it doesn’t actually block fingerprinting, it blocks domains known to collect and track your activity. The entire web is run on Google domains so that would be nearly impossible to block.
The crazy part about fingerprinting is that if you block the fingerprint data, they use that block to fingerprint you. That’s why the main strategy is to “blend in”.
Use their containers feature and make a google container so that all google domains go to that container.
If you want to get crazy, in either set in about:config or make yourself a user.is file in your Firefox profile directory and eliminate all communication with google. And some other privacy tweaks below.
I’m still trying to wrap my head around fingerprinting, so excuse my ignorance. Doesn’t an installed plugin such as Canvas Blocker make you more uniquely identifiable? My reasoning is that very few people have this plugin relatively speaking.
Maybe if they can connect you to your other usage but it’s probably more of their resources and such a small % of the population that it isn’t worth the time to subvert? Idk just guessing here
So I guess for Firefox users it’s time to enable the resist fingerprinting option ? https://support.mozilla.org/en-US/kb/resist-fingerprinting
I mean it doesn’t hurt but as far as I can tell, it doesn’t actually block fingerprinting, it blocks domains known to collect and track your activity. The entire web is run on Google domains so that would be nearly impossible to block.
The crazy part about fingerprinting is that if you block the fingerprint data, they use that block to fingerprint you. That’s why the main strategy is to “blend in”.
You can also use canvas blocker add-on.
Use their containers feature and make a google container so that all google domains go to that container.
If you want to get crazy, in either set in about:config or make yourself a user.is file in your Firefox profile directory and eliminate all communication with google. And some other privacy tweaks below.
google shit
user_pref(“browser.safebrowsing.allowOverride”, false); user_pref(“browser.safebrowsing.blockedURIs.enabled”, false); user_pref(“browser.safebrowsing.downloads.enabled”, false); user_pref(“browser.safebrowsing.downloads.remote.block_dangerous”, false); user_pref(“browser.safebrowsing.downloads.remote.block_dangerous_host”, false); user_pref(“browser.safebrowsing.downloads.remote.block_potentially_unwanted”, > user_pref(“browser.safebrowsing.downloads.remote.block_uncommon”, false); user_pref(“browser.safebrowsing.downloads.remote.enabled”, false); user_pref(“browser.safebrowsing.downloads.remote.url”, “”); user_pref(“browser.safebrowsing.malware.enabled”, false); user_pref(“browser.safebrowsing.phishing.enabled”, false); user_pref(“browser.safebrowsing.provider.google.advisoryName”, “”); user_pref(“browser.safebrowsing.provider.google.advisoryURL”, “”); user_pref(“browser.safebrowsing.provider.google.gethashURL”, “”); user_pref(“browser.safebrowsing.provider.google.lists”, “”); user_pref(“browser.safebrowsing.provider.google.reportURL”, “”); user_pref(“browser.safebrowsing.provider.google.updateURL”, “”); user_pref(“browser.safebrowsing.provider.google4.advisoryName”, “”); user_pref(“browser.safebrowsing.provider.google4.advisoryURL”, “”); user_pref(“browser.safebrowsing.provider.google4.dataSharingURL”, “”); user_pref(“browser.safebrowsing.provider.google4.gethashURL”, “”); user_pref(“browser.safebrowsing.provider.google4.lists”, “”); user_pref(“browser.safebrowsing.provider.google4.pver”, “”); user_pref(“browser.safebrowsing.provider.google4.reportURL”, “”); user_pref(“browser.safebrowsing.provider.google4.updateURL”, “”);
I’m still trying to wrap my head around fingerprinting, so excuse my ignorance. Doesn’t an installed plugin such as Canvas Blocker make you more uniquely identifiable? My reasoning is that very few people have this plugin relatively speaking.
Iirc, Websites can’t query addons unless those addons manipulate the DOM in a way that exposes themselves.
They can query extensions.
Addons are things installed inside the browser. Like uBlock, HTTPS Everywhere, Firefox Containerr, etc.
Extensions are installed outside the browser. Such as Flashplayer, the Gnome extensions installer, etc.
Maybe if they can connect you to your other usage but it’s probably more of their resources and such a small % of the population that it isn’t worth the time to subvert? Idk just guessing here
Privacy Badger anyone?
But does privacy badger also act on the canvas APIs & cie. ?
It annoys me that this is not on by default…