You are viewing a single thread.
View all comments
168 points

So I guess for Firefox users it’s time to enable the resist fingerprinting option ? https://support.mozilla.org/en-US/kb/resist-fingerprinting

permalink
report
reply
7 points

It annoys me that this is not on by default…

permalink
report
parent
reply
13 points

It’s a nice feature for those that actively enable it and know that it’s enabled, but not for the average user. Most people never change the default settings. Firefox breaking stuff by default would only decrease their market share even further. And this breaks so much stuff. Weird stuff. The average user wants a browser that “just works” and would simply just switch back to Chrome if their favourite website didn’t work as expected after installing Firefox. Chrome can be used by people who don’t even know what a browser is.

permalink
report
parent
reply
8 points

Privacy Badger anyone?

permalink
report
parent
reply
7 points

But does privacy badger also act on the canvas APIs & cie. ?

permalink
report
parent
reply
87 points
*

You can also use canvas blocker add-on.

Use their containers (firefox multi-account container add-on) feature and make a google container so that all google domains go to that container.

If you want to get crazy, in either set in about:config or make yourself a user.is file in your Firefox profile directory and eliminate all communication with google. And some other privacy tweaks below.

google shit and some extra privacy/security settings

Google domains and services:

user_pref(“browser.safebrowsing.allowOverride”, false);
user_pref(“browser.safebrowsing.blockedURIs.enabled”, false);
user_pref(“browser.safebrowsing.downloads.enabled”, false);
user_pref(“browser.safebrowsing.downloads.remote.block_dangerous”, false);
user_pref(“browser.safebrowsing.downloads.remote.block_dangerous_host”, false);
user_pref(“browser.safebrowsing.downloads.remote.block_potentially_unwanted”, false):
user_pref(“browser.safebrowsing.downloads.remote.block_uncommon”, false);
user_pref(“browser.safebrowsing.downloads.remote.enabled”, false);
user_pref(“browser.safebrowsing.downloads.remote.url”, “”);
user_pref(“browser.safebrowsing.malware.enabled”, false);
user_pref(“browser.safebrowsing.phishing.enabled”, false);
user_pref(“browser.safebrowsing.provider.google.advisoryName”, “”);
user_pref(“browser.safebrowsing.provider.google.advisoryURL”, “”);
user_pref(“browser.safebrowsing.provider.google.gethashURL”, “”);
user_pref(“browser.safebrowsing.provider.google.lists”, “”);
user_pref(“browser.safebrowsing.provider.google.reportURL”, “”);
user_pref(“browser.safebrowsing.provider.google.updateURL”, “”);
user_pref(“browser.safebrowsing.provider.google4.advisoryName”, “”);
user_pref(“browser.safebrowsing.provider.google4.advisoryURL”, “”);
user_pref(“browser.safebrowsing.provider.google4.dataSharingURL”, “”);
user_pref(“browser.safebrowsing.provider.google4.gethashURL”, “”);
user_pref(“browser.safebrowsing.provider.google4.lists”, “”);
user_pref(“browser.safebrowsing.provider.google4.pver”, “”);
user_pref(“browser.safebrowsing.provider.google4.reportURL”, “”);
user_pref(“browser.safebrowsing.provider.google4.updateURL”, “”);

Privacy and security stuff:

user_pref(“dom.push.enabled”, false);
user_pref(“dom.push.connection.enabled”, false);

user_pref(“layout.css.visited_links_enabled”, false);
user_pref(“media.navigator.enabled”, false);

user_pref(“network.proxy.allow_bypass”, false);
user_pref(“network.proxy.failover_direct”, false);
user_pref(“network.http.referer.spoofSource”, true);

user_pref(“security.ssl.disable_session_identifiers”, true);
user_pref(“security.ssl.enable_false_start”, false);
user_pref(“security.ssl.treat_unsafe_negotiation_as_broken”, true);
user_pref(“security.tls.enable_0rtt_data”, false);

user_pref(“privacy.partition.network_state.connection_with_proxy”, true);

user_pref(“privacy.resistFingerprinting”, true);
user_pref(“privacy.resistFingerprinting.block_mozAddonManager”, true);
user_pref(“privacy.resistFingerprinting.letterboxing”, true);
user_pref(“privacy.resistFingerprinting.randomization.daily_reset.enabled”, true);
user_pref(“privacy.resistFingerprinting.randomization.enabled”, true);

user_pref(“screenshots.browser.component.enabled”, false);

user_pref(“privacy.spoof_english”, 2);

user_pref(“webgl.enable-debug-renderer-info”, false); user_pref(“webgl.enable-renderer-query”, false);

permalink
report
parent
reply
31 points

This is why I like Lemmy, never knew canvas blocker was a thing. Thank you.

permalink
report
parent
reply
24 points

Or you just switch to LibreWolf where all these settings are already set. It even comes with uBlock preinstalled.

permalink
report
parent
reply
9 points

I’m still trying to wrap my head around fingerprinting, so excuse my ignorance. Doesn’t an installed plugin such as Canvas Blocker make you more uniquely identifiable? My reasoning is that very few people have this plugin relatively speaking.

permalink
report
parent
reply
2 points

Maybe if they can connect you to your other usage but it’s probably more of their resources and such a small % of the population that it isn’t worth the time to subvert? Idk just guessing here

permalink
report
parent
reply
2 points

Iirc, Websites can’t query addons unless those addons manipulate the DOM in a way that exposes themselves.

They can query extensions.

Addons are things installed inside the browser. Like uBlock, HTTPS Everywhere, Firefox Containerr, etc.

Extensions are installed outside the browser. Such as Flashplayer, the Gnome extensions installer, etc.

permalink
report
parent
reply
1 point

I use (and love) Firefox containers, and I keep all Google domains in one container. However, I never know what to do about other websites that use Google sign in.

If I’m signing into XYZ website and it uses my Google account to sign in, should I put that website in the Google container? That’s what I’ve been doing, but I don’t know the right answer.

permalink
report
parent
reply
5 points

Yes, that’s right. Also seriously consider ditching Single StalkSign On entirely.

permalink
report
parent
reply
15 points

I’ve used this. The only annoyance is that all the on-screen timestamps remain in UTC because JS has no idea what timesone you’re in.

I get that TZ provides a piece of the fingerprint puzzle, but damn it feels excessive.

permalink
report
parent
reply
13 points

And automatic darkmode isn’t respected, and a lot of other little annoyances. That’s why this is so difficult. These are all incredibly useful features we would have to sacrifice for privacy.

permalink
report
parent
reply
1 point

Dark mode can be recreated using extensions, although the colors most likely won’t be as legible as “native support”.

I don’t see why a similar extrnsion couldn’t change the timezones of clocks.

Additionally, I don’t see why the server should bother with either (pragmatically) - Dark mode is just a CSS switch and timezones could be flagged to be “localized” by the browser. No need for extra bandwidth or computing power on the server end, and the overhead would be very low (a few more lines of CSS sent).

Of course, I know why they bother - Ad networks do a lot more than “just” show ads, and most websites also like to gobble any data they can.

permalink
report
parent
reply
3 points

Wait is that why my Firefox giving me errors when I try to log into websites with 2FA?

permalink
report
parent
reply
13 points
*

I mean it doesn’t hurt but as far as I can tell, it doesn’t actually block fingerprinting, it blocks domains known to collect and track your activity. The entire web is run on Google domains so that would be nearly impossible to block.

The crazy part about fingerprinting is that if you block the fingerprint data, they use that block to fingerprint you. That’s why the main strategy is to “blend in”.

permalink
report
parent
reply
4 points

The crazy part about fingerprinting is that if you block the fingerprint data, they use that block to fingerprint you. That’s why the main strategy is to “blend in”.

So, essentially the best way to actually resist fingerprinting would be to spoof the results to look more common - for example when I checked amiunique.org one of the most unique elements was my font list. But for 99% of sites you could spoof a font list that has the most common fonts (which you have) and no others and that would make you “blend in” without harming functionality. Barring a handful of specific sites that rely on having a special font, that might need to be set as exceptions.

permalink
report
parent
reply
1 point

No, the best way is to randomly vary fingerprinting data, which is exactly what some browsers do.

Font list is just one of a hundred different identifying data points so just changing that alone won’t do much.

permalink
report
parent
reply

Does ublock do this?

permalink
report
parent
reply
18 points

Why does it do this?

  • Math operations in JavaScript may report slightly different values than regular.

PS grateful for this option!

permalink
report
parent
reply
21 points

Some math functions have slightly different results depending on architecture and OS, so they fuzz the results a little. Here’s a tor issue discussing the problem: https://gitlab.torproject.org/legacy/trac/-/issues/13018

permalink
report
parent
reply
6 points

But one question I’ve been asking myself is : then, wouldn’t I be fingerprinted as one of the few nerds who activated the resist fingerprinting option?

permalink
report
parent
reply
1 point

Please don’t enable this blindly. A lot of modern websites depend on a bunch of features which will simply not work with that flag enabled. Only do it, if you’re willing to compromise and debug things a bit

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


Community stats

  • 20K

    Monthly active users

  • 14K

    Posts

  • 609K

    Comments