this post was submitted on 18 Feb 2025
961 points (99.3% liked)

Technology

63009 readers
2410 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
(page 2) 50 comments
sorted by: hot top controversial new old
[–] [email protected] 51 points 2 days ago (3 children)

Yeah, I have an anti fingerprint extension installed in Firefox, and immediately no Google site will work anymore, all google sessions break with it while most other sites just continue to work.

I'm working to rid myself completely from Google, my target being that I will completely DNS block all google (and Microsoft and Facebook) domains within a year or so. Wish I could do it faster but I only have a few hours per weekend for this

[–] [email protected] 16 points 2 days ago (1 children)

Mind sharing what extension you use?

[–] [email protected] 28 points 2 days ago* (last edited 1 day ago) (7 children)

Hi, here are the extensions I use in FireFox/Librewolf (all will work in Chromium too, but I don't recommend Chromium browsers):

Privacy and Security-focused

uBlock Origin: A lightweight and efficient wide-spectrum content blocker.

Decentraleyes: Protects you from tracking through free, centralized content delivery. (not recommended alongside uBlock Origin; see the reply below)

CanvasBlocker: Protects your privacy by preventing websites from fingerprinting you using the Canvas API.

Ghostery Tracker & Ad Blocker - Privacy AdBlock: Blocks trackers and ads to protect your privacy and speed up browsing. Also has a handy feature that automatically rejects cookies for you. (not recommended alongside uBlock Origin; see the reply below. You can disable the ad blocking functionality and keep the cookie rejection function).

KeePassXC-Browser: Integrates KeePassXC password manager with your browser.

NoScript: Blocks JavaScript, Flash, and other executable content to protect against XSS and other web-based attacks (note: you will be required to manually activate javascript on each web page that you visit, but this is a good practice that you should get used to).

Privacy Badger: Automatically learns to block trackers based on their behavior. (not recommended alongside uBlock Origin; see the reply below)

User-Agent Switcher and Manager: Allows you to spoof your browser’s user-agent string (avoid creating a unique configuration; opt for something common, such as Chrome on Windows 10).

Violentmonkey: A user script manager for running custom scripts on websites (allows you to execute your own JavaScript code, usually to modify how a website behaves or block behavior that you don't like. VERY useful. Check out greasyfork for UserScripts).

Other useful extensions (non-privacy/security)

Firefox Translations: Provides on-demand translation of web pages directly within Firefox.

Flagfox: Displays a flag depicting the location of the current website’s server.

xBrowserSync: Syncs your browser data (bookmarks, passwords, etc.) across devices with end-to-end encryption.

Plasma Integration: Integrates Firefox with the KDE Plasma desktop environment (for linux users).

[–] [email protected] 11 points 2 days ago

Thanks for the list! Although most of the time it's advised to not use multiple adblocker in tandem, because they might conflict with each other and get detected by the website. For example, uBlock origin has, in its settings, an option to disable JavaScript and in the filter list, an option to block cookie banners "Cookie notices". But if all of these work for you that's great!

load more comments (6 replies)
load more comments (2 replies)
[–] [email protected] 27 points 2 days ago (2 children)

Time for a user agent switcher. Like "Yeah, I swear, I'm a PS5, that has only monospaced comic sans insrelled"

[–] [email protected] 13 points 2 days ago (1 children)

Jokes aside, keep in mind that the idea of fingerprinting is that your computer's configuration is as unique as a fingerprint (e.g., your monitor is x resolution, you are on this operating system, you are using these following extensions in this browser, you have these fonts on your system).

Setting your user agent to something super unique is basically shining a spotlight on yourself.

I recommend this user agent switcher extension (firefox)

[–] [email protected] 8 points 2 days ago* (last edited 2 days ago) (1 children)

It's way worse than that.

Even if you somehow magically have the same settings as everyone else, you're mouse movement will still be unique.

You can even render something on a canvas out of view and depending on your GPU, your graphics driver, etc the text will look different...

There is no real way to escape fingerprinting.

[–] [email protected] 4 points 2 days ago (1 children)

I have a novice coding question using the mouse tracking as an example: Is it possible to intercept and replace mouse tracking data with generic inputs? For example, could you implement an overlay that blocks mouse interactions, and instead of physically clicking on elements, send a direct packet to the application to simulate selecting those elements?

[–] [email protected] 7 points 2 days ago

Yes, it's possible. That's the way a lot of automated web UI testing tools work. The problem with doing it during normal browser use is that your intentional actions with the real mouse wouldn't work right, or the page would start acting like you clicked on things you didn't click on.

[–] [email protected] 26 points 2 days ago* (last edited 2 days ago) (1 children)

Fingerprinting unfortunately uses more than useragent strings. It takes hashes of data in your browser from a javascript context that is not easily masked or removed. For example, it might render a gradient of colors projected onto a curved 3d plane. The specific result of this will create a unique hash for your GPU. They can also approximate your geolocation by abusing the time-to-live information within a TCP packet, which is something you can't control on the clientside at all. If you TRULY want to avoid tracking by google, you need to block google domains in your hosts file and maybe consider disabling javascript on all sites by default until you trust them. Also don't use google.

load more comments (1 replies)
[–] [email protected] 15 points 2 days ago

Time for meshnet?

load more comments
view more: ‹ prev next ›