this post was submitted on 15 Dec 2024
163 points (100.0% liked)

Privacy

32173 readers
205 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

On Librewolf i got 16.48 bits of information, on TOR browser 10.32 bits, but on Tails I managed to get only 9.3 bits.

https://coveryourtracks.eff.org/

top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 2 points 10 hours ago (1 children)

It constantly gives me 17.5 bits on several browsers firefox, nyxt, gnu icecat, librewolf...

[–] [email protected] 2 points 10 hours ago

Number of bits can also depend on your UI scaling, resolution and timezone.

[–] [email protected] 1 points 13 hours ago
[–] douglasg14b 4 points 21 hours ago

Default Google Chrome embedded on Android with nothing configured and googled up.

17 bits.

[–] [email protected] 3 points 1 day ago* (last edited 1 day ago) (1 children)

9.3 bits / 1:628.3
(ipadOS / safari)

...how do they quantify 3/10 of a bit?..

[–] [email protected] 4 points 1 day ago* (last edited 1 day ago)

They probably give entropy value, average number of, yes or no, questions that are needed to identify You. (Guess all the information that your browser provided)

[–] [email protected] 17 points 1 day ago (2 children)

Am I wrong to assume trying to blend in is a worse and contradictory strategy than trying to actively protect yourself from tracking?

If you want to not be unique, use default setting chrome without adblock. Your browser will look just like anybody else's, but they will literally know who you are.

On the opposite side of the spectrum, you lock everything down and spike as a very special browser and... that's all they know.

[–] [email protected] 21 points 1 day ago (2 children)
[–] [email protected] 2 points 22 hours ago

Not what I meant: https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting

"If you do nothing on desktop, you are already uniquely identifiable - screen, window and font metrics alone are probably enough - add timezone name, preferred languages, and several dozen other metrics and it is game over. Here is a link to the results of a study done in 2016 showing a 99.24% unique hit rate (and that is excluding IP addresses).

Changing a few prefs from default is not going to make you "more unique" - there is no such thing."

Basically making yourself less unique is impossible so there's no sensible tradeoff to be made (other than in the context of Tor and Mullvad Browser).

[–] [email protected] 3 points 1 day ago

Right. The question is whether they can attach what they know to an identity. Depends on your threat model which goal you need to achieve.

[–] [email protected] 12 points 1 day ago* (last edited 1 day ago)

But then they can know a lot more since they don't even need to drop a cookie to track you. But that's a different threat model.

[–] [email protected] 5 points 1 day ago (2 children)

Your browser fingerprint appears to be unique among the 183,951 tested in the past 45 days.

Currently, we estimate that your browser has a fingerprint that conveys at least 17.49 bits of identifying information.

well shoot my mobile failed that test lmao

[–] [email protected] 4 points 1 day ago

I got 17.5 on my Desktop Firefox lol

[–] [email protected] 6 points 1 day ago (1 children)
[–] [email protected] 6 points 1 day ago (1 children)

I got exactly that number too, but also when I looked at the detailed results section lots of it was incorrect. It got that I was on some sort of Linux and using some sort of FF variant, but things like time zone, plugins, screen resolution and system fonts were all wrong.

So sending out 17.49 bits of largely identifying bullshit is still okay I think lol.

[–] [email protected] 3 points 1 day ago

Could it be that the browser shares false information on purpose?

[–] [email protected] 53 points 2 days ago (2 children)

If you have canvas randomisation turned on (firefox) you'll always be unique but also not traceable between sessions.

[–] [email protected] 4 points 1 day ago (1 children)

How do you turn on canvas randomisation in Firefox? I can't seem to find anything about it.

[–] [email protected] 2 points 17 hours ago

I found this in about:config, defaults to true apparently: privacy.resistFingerprinting.randomDataOnCanvasExtract

But you have to enable privacy.resistFingerprinting for it to work first. I enabled that and now the EFF test says "randomized" for the hashes but also Lemmy went from dark to light theme somehow.

[–] [email protected] 11 points 2 days ago

Yup, canvas is heavily weighted in this test based on the results.

[–] [email protected] 2 points 1 day ago (1 children)
[–] [email protected] 1 points 1 day ago (1 children)

Didn't know Vivaldi had this capability, I just used it because it was the only decent browser with an on/off sidebar till zen

[–] [email protected] 1 points 18 hours ago

Not only the sidebar, you can tweak almost everything to your like.

[–] [email protected] 54 points 2 days ago (1 children)

I’m unique :) this ain’t great

[–] [email protected] 20 points 2 days ago (1 children)

its ok if your fingerprint changes on every browser startup

[–] [email protected] 7 points 2 days ago (1 children)

...as long as you are blocking tracking cookies, and aren't on a session with a website that's tracking you.

Otherwise, you just have a nice unique hash in your cookies. A password manager could help here.

[–] broken_chatbot 2 points 1 day ago (1 children)

A password manager? Could you explain why?

[–] [email protected] 1 points 1 day ago (1 children)

Cookies and other ways of keeping a session upright are kept by the browser. So unless you're mad enough to copy cookies between devices, they prove you're on the same device.

Using a password every time you log in, and letting your browser wipe everything on shutdown does not show websites wether you're on yhe same or another device.

[–] [email protected] 1 points 21 hours ago (1 children)

@Boomkop3 @broken_chatbot Do you mean not keeping browser history actually makes big difference? I do that for few years but wasn't sure how much it really helped.

[–] [email protected] 1 points 18 hours ago (1 children)

That does not matter, cookies and other local web storage can though

[–] [email protected] 0 points 15 hours ago (1 children)

@Boomkop3 I mean full erase on shutdown, like in private window.

[–] [email protected] 1 points 9 hours ago

That includes that stuff, yep.

[–] [email protected] 3 points 1 day ago

Vanadium: Your Results Within our dataset of several hundred thousand visitors tested in the past 45 days, only one in 61101.0 browsers have the same fingerprint as yours.

Currently, we estimate that your browser has a fingerprint that conveys 15.9 bits of identifying information.

[–] [email protected] 6 points 2 days ago

16.47 on Cromite. But most of the identify information is not even true, almost everything is spoofed. User agent, timezone, operating system, browser name, screen size and color depth, device, even the battery percentage

[–] [email protected] 18 points 2 days ago (1 children)

"Your browser fingerprint appears to be unique among the 183,614 tested in the past 45 days.

Currently, we estimate that your browser has a fingerprint that conveys at least 17.49 bits of identifying information."

Chat am I cooked?

load more comments (1 replies)
[–] [email protected] 24 points 2 days ago* (last edited 2 days ago) (1 children)

With browser settings that actually let me use the internet in a way that's not overly cumbersome and annoying, I get 16bits or something and a "nearly unique fingerprint"

load more comments (1 replies)
[–] [email protected] 5 points 1 day ago (1 children)

with budget vpn on: one in 22756.25 browsers have the same fingerprint as yours

with budget vpn off and just apple safebrowsing on: one in 20231.22 browsers have the same fingerprint as yours.

i have the worst vpn!

[–] [email protected] 4 points 1 day ago (1 children)

A VPN is unrelated, it changes your IP but the IP is not used to fingerprint.

[–] [email protected] 1 points 1 day ago* (last edited 1 day ago) (1 children)

i got the above results every time i ran it with or without the VPN so you can say that but it's obviously having an impact.

just enabling/disabling the VPN between tests and clicking the link again.

[–] [email protected] 1 points 1 day ago (1 children)

It might have a side effect but it's still unrelated and useless for the purpose at hand.

[–] [email protected] 1 points 1 day ago (1 children)

so to what do you attribute the difference in score, when it's different with the VPN on vs off I wonder?

I'm amused at your insistence it does nothing when it clearly does.

[–] [email protected] 1 points 1 day ago (1 children)

That's side effects, the difference is irrelevant anyway.

I insist because I think it's important to understand this, both for you and for people reading these comments. The whole point of fingerprinting is to be able to track users without relying on cookies or IP. Changing IP does not protect against fingerprinting. I don't want people to be mislead by your comment and think they are going to avoid tracking by just taking a better VPN.

You can read more here:

https://coveryourtracks.eff.org/about#browser-fingerprinting

“Browser fingerprinting” is a method of tracking web browsers by the configuration and settings information they make visible to websites, rather than traditional tracking methods such as IP addresses and unique cookies.

And you can check the source code to see there is no mention of IP address:

https://github.com/EFForg/cover-your-tracks/blob/master/fingerprint/fingerprint_helper.py

[–] [email protected] 1 points 1 day ago (1 children)

if it changes the score than how is it meaningless? the score is worthless?

[–] [email protected] 1 points 21 hours ago

It's not worthless but it's on only an indication, an example.

Isn't the score change similar to the one you have when toggling Apple safebrowsing? (whatever that is)

A probable explanation is that your VPN client is somehow changing some of your browser settings. The VPN client, not the VPN itself.

Just check the detailed results to see what's changed between the two. Whatever it is it could be changed manually, it's does not require a VPN to change. But you probably don't want to change it because your score with a VPN is worse than without.

But this has nothing to do with a VPN being the best or the worse.

[–] [email protected] 4 points 1 day ago

I get 8.44 bits (1 in 347.34 browsers). I use Firefox with Arkenfox user.js applied on top, with some of my own custom overrides.

However, I think the biggest factor could be because I have Ublock Origin set to medium-hard mode (block 1st party scripts, 3rd party scripts and 3rd party iframes by default on all websites), so the lack of JavaScript heavily affects what non-whitelisted websites can track. I did whitelist 1st-party scripts on the main domain for this test (coveryourtracks.eff.org), but all the 'tracker' site redirects stay off the whitelist.

I actually had to allow Ublock Origin to temporarily visit the tracker sites for the test to properly finish--otherwise it gives me a big warning that I'm about to visit a domain on the filter list.

[–] [email protected] 10 points 2 days ago

Your browser fingerprint appears to be unique among the 183,996 tested in the past 45 days.

:(

[–] [email protected] 11 points 2 days ago* (last edited 2 days ago)

Despite having strong protection according to these results, I always get unique fingerprinting from them. Which is scary.

Edit: Now I tried Tor on my desktop and got:

Within our dataset of several hundred thousand visitors tested in the past 45 days, only one in 628.7 browsers have the same fingerprint as yours. Currently, we estimate that your browser has a fingerprint that conveys 9.3 bits of identifying information.

[–] [email protected] 10 points 2 days ago* (last edited 2 days ago)

Huh mullvad browser got me the lowest overall. 10.44 bits and a non-unique fingerprint.

Compared against:

  • Firefox with arkenfox user.js (macOS)
  • Tor (macOS and android)
  • Vanadium (android)
  • Cromite (android)
  • Mull (different than mullvad) (android)

I do a vast majority of my browsing on my phone, unfortunately. Vanadium scored the best (on mobile), but it not having extensions (dark reader is a must) and the navigation bar not being movable to the bottom of the screen keeps me on Mull.

I don't love using mullvad for day to day browsing as I can't whitelist specific cookies to retain. Don't love having to re 2fa daily.

load more comments
view more: next ›