• Ulrich@feddit.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      5 days ago

      I mean it doesn’t hurt but as far as I can tell, it doesn’t actually block fingerprinting, it blocks domains known to collect and track your activity. The entire web is run on Google domains so that would be nearly impossible to block.

      The crazy part about fingerprinting is that if you block the fingerprint data, they use that block to fingerprint you. That’s why the main strategy is to “blend in”.

    • masterofn001@lemmy.ca
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      5 days ago

      You can also use canvas blocker add-on.

      Use their containers feature and make a google container so that all google domains go to that container.

      If you want to get crazy, in either set in about:config or make yourself a user.is file in your Firefox profile directory and eliminate all communication with google. And some other privacy tweaks below.

      google shit

      user_pref(“browser.safebrowsing.allowOverride”, false); user_pref(“browser.safebrowsing.blockedURIs.enabled”, false); user_pref(“browser.safebrowsing.downloads.enabled”, false); user_pref(“browser.safebrowsing.downloads.remote.block_dangerous”, false); user_pref(“browser.safebrowsing.downloads.remote.block_dangerous_host”, false); user_pref(“browser.safebrowsing.downloads.remote.block_potentially_unwanted”, > user_pref(“browser.safebrowsing.downloads.remote.block_uncommon”, false); user_pref(“browser.safebrowsing.downloads.remote.enabled”, false); user_pref(“browser.safebrowsing.downloads.remote.url”, “”); user_pref(“browser.safebrowsing.malware.enabled”, false); user_pref(“browser.safebrowsing.phishing.enabled”, false); user_pref(“browser.safebrowsing.provider.google.advisoryName”, “”); user_pref(“browser.safebrowsing.provider.google.advisoryURL”, “”); user_pref(“browser.safebrowsing.provider.google.gethashURL”, “”); user_pref(“browser.safebrowsing.provider.google.lists”, “”); user_pref(“browser.safebrowsing.provider.google.reportURL”, “”); user_pref(“browser.safebrowsing.provider.google.updateURL”, “”); user_pref(“browser.safebrowsing.provider.google4.advisoryName”, “”); user_pref(“browser.safebrowsing.provider.google4.advisoryURL”, “”); user_pref(“browser.safebrowsing.provider.google4.dataSharingURL”, “”); user_pref(“browser.safebrowsing.provider.google4.gethashURL”, “”); user_pref(“browser.safebrowsing.provider.google4.lists”, “”); user_pref(“browser.safebrowsing.provider.google4.pver”, “”); user_pref(“browser.safebrowsing.provider.google4.reportURL”, “”); user_pref(“browser.safebrowsing.provider.google4.updateURL”, “”);

      • Chulk@lemmy.ml
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 days ago

        I’m still trying to wrap my head around fingerprinting, so excuse my ignorance. Doesn’t an installed plugin such as Canvas Blocker make you more uniquely identifiable? My reasoning is that very few people have this plugin relatively speaking.

        • RecallMadness@lemmy.nz
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 days ago

          Iirc, Websites can’t query addons unless those addons manipulate the DOM in a way that exposes themselves.

          They can query extensions.

          Addons are things installed inside the browser. Like uBlock, HTTPS Everywhere, Firefox Containerr, etc.

          Extensions are installed outside the browser. Such as Flashplayer, the Gnome extensions installer, etc.

        • happydoors@lemm.ee
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 days ago

          Maybe if they can connect you to your other usage but it’s probably more of their resources and such a small % of the population that it isn’t worth the time to subvert? Idk just guessing here