this post was submitted on 21 May 2024
55 points (96.6% liked)

Privacy

32173 readers
747 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

Hello, always wanted to know the absolute best to have the most private (and secure) browser, need tips for android and linux. I think Firefox based browser are the best choice but i'm open to recommendations!! THX

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 5 points 7 months ago (3 children)

I wanna go a bit beyond, like I'm using arkenfox's user.js but it's not as complete as i would, and I'm using some extensions, and the main part that i would improve is my fingerprinting, any ideas? And for android, going to use Mull but do you have any recommendations?

[–] PunkiBas 11 points 7 months ago (1 children)

Extensions installed on any browser make your fingerprint more unique. For PC your best option against fingerprinting would probably be using n unmodified mullvad browser, and on android, mull, with the least extensions posible.

[–] [email protected] 1 points 7 months ago (1 children)

Humm, okay, but for example is there any possibility to spoof normal installation to websites?

[–] Deckweiss 3 points 7 months ago

Chameleon ff extension

[–] [email protected] 8 points 7 months ago

I looked into this a while ago. It seems the best you can do is to try to look the most "average". All attempts to obfuscate details other than "average" make you stand out even worse.

[–] [email protected] 2 points 7 months ago (2 children)

Seems like you have a better idea than I do about privacy so I'm probably not gonna be much help. However make sure that you use extensions that you trust or use as few permissions as possible because that also can be another vector where information can leak.

Oh and there was a post on here sometime ago about a website that show what kind of information it can get from your web browser so you could use that to check how much info you are leaking on the web at least.

~Anti~ ~Commercial-AI~ ~license~ ~(CC~ ~BY-NC-SA~ ~4.0)~

[–] [email protected] 8 points 7 months ago (2 children)
[–] [email protected] 4 points 7 months ago

Wooo that list is crazy 🤯

[–] [email protected] 2 points 7 months ago (1 children)

That's a lot of information, for me at least. Short of searching for what those mean individually, is there a recommended way to learn more about these? Like how they ultimately effect people or could be used maliciously or effect security or privacy?

I have no usable programming skills and my knowledge in this subject is limited to roughly what I've learned from https://amiunique.org but those two links seem to be on a whole different level.

Maybe better questions to ask would be: How could a layman understand these things better? Is it feasible to learn more without extensive college level classes on programming and/or computer science? Should the average person need to worry, assuming they have nothing more to hide than a less-than-average bank account balance or habitual browsing of adult media which to the best of their knowledge is legal and consensual where they live and who have no social media or social life or ties to political movements, major corporations, news organizations, critical infrastructure or charities?

[–] [email protected] 3 points 7 months ago

Each are data points that together contribute to your total fingerprint. TZP tells you a lot of these data points, and fails ones that dont match Firefox Resistant Fingerprint masked data. Creepjs does much of the same but without gearing towards Firefox.

Generally fingerprintable things include:

Do not track signal.
Private browsing mode.
Timezone.
Useragent.
Canvas noise.
Installed fonts.
Font sizes.
Browser built-in plugins.
Some extensions.
WebRTC.
Theme.
Cookies.
IP address.
Local IPs (website can execute an ip scan and fingerprint).
Window viewport size.
Full screen mode viewport sizing.
Page/font color settings.
Operating System (impossible to mask because of differences in rendering on platforms).
Browser App name & icon. System TTS synthesis engine.
DOM modification fingerprinting (like that used by many extensions). Mouse speed.
Keyboard behavior.
Stylometric fingerprinting.
And many more.