this post was submitted on 18 Feb 2025
962 points (99.3% liked)

Technology

63009 readers
2410 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
(page 3) 50 comments
sorted by: hot top controversial new old
[–] [email protected] 28 points 2 days ago (3 children)

It would be nice to hammer a manually created fingerprint into the browser and share that fingerprint around. When everyone has the same fingerprint, no one can be uniquely identified. Could we make such a thing possible?

[–] [email protected] 25 points 2 days ago (2 children)

Not really. The "fingerprint" is not one thing, it's many, e.g. what fonts are installed, what extensions are used, screen size, results of drawing on a canvas, etc... Most of this stuff is also in some way related to the regular operation of a website, so many of these can't be blocked.

You could maybe spoof all these things, but some websites may stop behaving correctly.

load more comments (2 replies)
[–] [email protected] 3 points 2 days ago (2 children)
[–] [email protected] 10 points 2 days ago (1 children)

No it isn't.

And this is really important. If you go on Google tracked websites without tor, Google will still know it's you when you use tor, even if you've cleared all your cookies.

Tor means people don't know your IP address. It doesn't protect against other channels of privacy attack.

[–] [email protected] 8 points 2 days ago (8 children)

Yes, it is.. Tor prevents against fingerprinting as well. It isn't just relay plumbing to protect your IP.. This can easily be tested on any fingerprinting site with default config of Tor demonstrating a low entropy https://blog.torproject.org/browser-fingerprinting-introduction-and-challenges-ahead/

load more comments (8 replies)
load more comments (1 replies)
load more comments (1 replies)
[–] [email protected] 10 points 2 days ago (2 children)

But why would any browser accept access to those metadata so freely? I get that programming languages can find out about the environment they are operating in, but why would a browser agree to something like reading installed fonts or extensions without asking the user first? I understand why Chrome does this, but all of the mayor ones and even Firefox?

[–] [email protected] 17 points 2 days ago (2 children)

Because the data used in browser fingerprinting is also used to render pages. Example: a site needs to know the size of browser window to properly fit all design elements.

load more comments (2 replies)
[–] [email protected] 8 points 2 days ago (1 children)

Firefox has built-in tracking protection.

[–] [email protected] 9 points 2 days ago* (last edited 2 days ago) (2 children)

I know that it has that in theory, but my Firefox just reached a lower score on https://coveryourtracks.eff.org/ (which was posted in this threat, thanks!) than a Safari. Firefox has good tracking protection but has an absolute unique fingerprint, was 100% identifiable as the first on the site, as to Safari, which scored a bit less in tracking but had a not unique fingerprint.

load more comments (2 replies)
[–] [email protected] 11 points 2 days ago (1 children)

We need Richard Hendricks and his new internet asap

[–] [email protected] 4 points 2 days ago (1 children)

What's this about? Fill me in? 🙏

[–] [email protected] 7 points 2 days ago (1 children)

He was the main character on Silicon Valley

[–] [email protected] 2 points 2 days ago (1 children)

Oh okay. I should pick that show up again, finish what I started.

Thanks!

load more comments (1 replies)
[–] [email protected] 11 points 3 days ago

new? isn't this at least like a decade old method of tracking?

[–] [email protected] 50 points 3 days ago (1 children)

Which is why I had hoped the EU would ban all forms of fingerprinting and non-essential data tracking. But they somehow got lobbied into selecting cookies as the only possible mechanism that can be used, leaving ample room to track using other methods.

[–] [email protected] -1 points 2 days ago (2 children)

How would that even be enforced?

[–] [email protected] 15 points 2 days ago (2 children)

same way other regulations are enforced: fines

[–] [email protected] 4 points 2 days ago (2 children)

That might work if the fine was say $1.5 B

load more comments (2 replies)
[–] [email protected] 1 points 2 days ago (3 children)

How do you prove they’re doing it?

load more comments (3 replies)
load more comments (1 replies)
[–] [email protected] 4 points 3 days ago

We're all gonna need to use whonix for basic shit now

[–] [email protected] 11 points 3 days ago (2 children)

Using Mullvad Browser + Mullvad VPN could mitigate this a little bit. Because if you use it as intended (don’t modify Mullvad browser after installation) , all Mullvad users would have the same browser fingerprint and IPs from the same pool.

[–] [email protected] 3 points 2 days ago

The problem is it's all or nothing. You must foil IP address, fingerprint, and cookies - all three at once.

Mullvad browser might make your fingerprint look similar to other users, but it's not common is the problem. Test it with the EFF Cover your tracks site.

[–] [email protected] 6 points 3 days ago

its captcha v3, its the same thing reddit uses to catch bots and ban evaders, apparently its expensive for reddit so they only mostly use it for ban waves.

load more comments
view more: ‹ prev next ›