TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Web fingerprinting is worse than I thought

620 pointsby Bright_Machineabout 2 years ago

75 comments

mihaicabout 2 years ago
Fingerprinting is doing terrible things for big-tech data collection, and at the same time it&#x27;s excruciatingly hard to protect against bots, spammers, fraudaters etc without it.<p>Few people seem to try to reconcile this, since neither side cares about the other.<p>I personally think that discussion about fingerprinting as raw tech, without mentioning the size of the company collecting the date or the purpose is meaningless, and only leads to a few tech savy users having less data collected on them.<p>Most people want to use Javascript, use the default setting and not be afraid of clicking on links. I can&#x27;t really see a good solution without a coordination of regulation and tech standards, so I&#x27;m hopeful at least for decent solutions.
评论 #35244849 未加载
评论 #35246494 未加载
评论 #35249781 未加载
jonhohleabout 2 years ago
Until everyday people realize they’re being stalked, I don’t know what will change. I am seriously thinking about trying to go through the proposition process in my state to forbid selling of data (this should already run afoul of wiretapping laws, imho).<p>I thought having an ad campaign that targeted subgroups very specifically and boldly might be enough drum up public interest. Something like: “Hello $name from $city. How did $recent_embarrasing_purchase work out? I hope you enjoy your birthday in $birth_month.” And then a link to the proposed policy.<p>Unfortunately, marketers have neither scruples nor the ability to control themselves and have captured an asymmetric advantage. Technologists do what they do, preoccupied with whether or not they could, not stopping to think if they should. It seems like legislation may be the only remaining option.
评论 #35247599 未加载
评论 #35251496 未加载
评论 #35246398 未加载
评论 #35249694 未加载
评论 #35248306 未加载
评论 #35247425 未加载
评论 #35247280 未加载
评论 #35249295 未加载
评论 #35247004 未加载
hilbert42about 2 years ago
Ha! I followed the instructions and went to fingerprint.com and it all &#x27;crashed&#x27; because I had JavaScript turned off—that&#x27;s my normal default setting.<p>I have five different browsers on my smartphone and three on the PC all sans JS and none of them are Chrome. Also, normal operation is to automatically delete all cookies at session&#x27;s end.<p>My smartphone and PCs are de-googleized and firewalled and I never see ads in my browsers nor in apps. The apps are mainly from F-Droid and sans ads and the few Playstore ones I use are via Aurora Store and are firewalled from the internet when in use. Honestly, I cannot remember when I last saw an app display an ad, it has to be years back.<p>In the past I used to go to more extensive measures to stop the spying but I found it was unnecessary as the spy leakage was essentially negligible with much less stringent efforts.<p>It&#x27;s pretty easy to render one&#x27;s online personal data essentially wothlesss if one wants to. On the other hand if you insist on using JS, Gmail, Google search, Facebook etc. then you&#x27;re fair game and you only have yourself to blame if your personal data is stolen.
评论 #35245283 未加载
评论 #35244768 未加载
评论 #35244194 未加载
chaositeabout 2 years ago
It&#x27;s important to know that the mentioned &quot;resistFingerprinting&quot; breaks a lot of the web.<p>Examples include the back button, uploading photos on some websites uploads random data instead of the photo, etc.
评论 #35243466 未加载
评论 #35244400 未加载
评论 #35243692 未加载
评论 #35245312 未加载
评论 #35288569 未加载
评论 #35243679 未加载
评论 #35245598 未加载
redbellabout 2 years ago
Another method for web fingerprinting is called GPU-Fingerprinting [0], codenamed &#x27;DrawnApart&#x27;, it relies on WebGL to count the number and speed of the execution units in the GPU, measure the time needed to complete vertex renders, handle stall functions, and more stuff..<p>_______________________<p>0. <a href="https:&#x2F;&#x2F;www.bleepingcomputer.com&#x2F;news&#x2F;security&#x2F;researchers-use-gpu-fingerprinting-to-track-users-online&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.bleepingcomputer.com&#x2F;news&#x2F;security&#x2F;researchers-u...</a>
zamubafooabout 2 years ago
As the years pass, I keep thinking back and realize that Richard Stallman was right all along:<p>&gt; For personal reasons, I do not browse the web from my computer. (I also have not net connection much of the time.) To look at page I send mail to a demon which runs wget and mails the page back to me. It is very efficient use of my time, but it is slow in real time.
评论 #35243900 未加载
评论 #35244566 未加载
评论 #35246086 未加载
评论 #35249929 未加载
评论 #35245685 未加载
izacusabout 2 years ago
Why is this being fought with technical measures (which are ineffective and cripple the web as a platform) instead of legal consumer law where you can easily fine and punish companies that do the fingerprinting?<p>EDIT: Note that you can do BOTH - but one without the other is just a game of whack-a-mole.
评论 #35243813 未加载
评论 #35243871 未加载
评论 #35243950 未加载
评论 #35243817 未加载
评论 #35243992 未加载
评论 #35243884 未加载
评论 #35244325 未加载
noduermeabout 2 years ago
Look, forget about threat models. It&#x27;s relatively trivial these days to avoid fingerprinting attacks if you want to (as a private, web browsing individual).<p>I use fingerprinting actively in enterprise apps as a form of silent 3FA. It&#x27;s a useful backstop. If I have a user who forgot their password but retrieves it via email, I&#x27;ll usually let them pass if their fingerprint matches one of their priors; otherwise my software shoots off an email to their immediate superior to make that manager validate that the machine the employee is using is one they can vouch for.<p>I&#x27;ve always viewed browser fingerprinting as something that can be leveraged as a security feature. It&#x27;s far more useful for that than for some sort of distributed tracking. I&#x27;d never want to live in a world <i>(ahem ... China)</i> where submitting to such fingerprinting actively was mandatory, or politically punishable if you didn&#x27;t. No society should be run like an employer&#x2F;employee organization with that sort of lack of trust. <i>No sane free person would allow their own browser to transmit a fingerprint.</i> But for employer&#x2F;employee systems management? It&#x27;s a great tool in the box.
评论 #35243693 未加载
评论 #35244104 未加载
评论 #35243767 未加载
评论 #35245881 未加载
评论 #35243818 未加载
ThePhysicistabout 2 years ago
Using the IP address &amp; user agent alone already gives you nearly 100 % accuracy, so the fact that they can re-identify you when these things stay identical isn&#x27;t surprising at all. I tested that website as well and if you take care to rotate your IP address their re-identification rate becomes abysmal, especially if you&#x27;re using a privacy-focused browser and extensions like Privacy Badger &#x2F; uBlock.
评论 #35244740 未加载
评论 #35244138 未加载
luckystarrabout 2 years ago
I use the usual adblocker UBlock and:<p>* <a href="https:&#x2F;&#x2F;addons.mozilla.org&#x2F;de&#x2F;firefox&#x2F;addon&#x2F;canvasblocker&#x2F;" rel="nofollow">https:&#x2F;&#x2F;addons.mozilla.org&#x2F;de&#x2F;firefox&#x2F;addon&#x2F;canvasblocker&#x2F;</a><p>which prevents fingerprinting via Canvas elements, additionally warns you if a site does it. There are more sites out there than you would assume. Some stupid blogs even.<p>* <a href="https:&#x2F;&#x2F;addons.mozilla.org&#x2F;en-US&#x2F;firefox&#x2F;addon&#x2F;multi-account-containers&#x2F;" rel="nofollow">https:&#x2F;&#x2F;addons.mozilla.org&#x2F;en-US&#x2F;firefox&#x2F;addon&#x2F;multi-account...</a><p>This splits your tabs into different categories, each with their own cookie storage.<p>The fingerprinting website in the article didn&#x27;t manage to correlate me visiting the website concurrently from two distinct container tabs.
评论 #35244015 未加载
kapsteurabout 2 years ago
You can try <a href="https:&#x2F;&#x2F;www.amiunique.org&#x2F;fp" rel="nofollow">https:&#x2F;&#x2F;www.amiunique.org&#x2F;fp</a> to get a view of all params can used to track you
评论 #35243807 未加载
评论 #35247424 未加载
评论 #35244404 未加载
评论 #35244233 未加载
matheusmoreiraabout 2 years ago
I wish browsers did more to combat this. There should be ways to randomize or normalize every bit of information they try to gather.
评论 #35243523 未加载
评论 #35243550 未加载
walrus01about 2 years ago
If you don&#x27;t pay attention to it you might be surprised how non dynamic your residential internet last mile DHCP assigned IP really is. It&#x27;s not uncommon to go many months or a year with having it always renew to the same address. That, combined with all the fingerprinting mentioned in the article...
评论 #35243490 未加载
评论 #35243665 未加载
评论 #35243524 未加载
评论 #35243710 未加载
throwaway2056about 2 years ago
It is interesting that the site can fingerprint individual profiles&#x2F;dir easily:<p>For example<p>chromium-browser --user-data-dir=&#x2F;tmp&#x2F;profile_A<p>chromium-browser --user-data-dir=&#x2F;tmp&#x2F;profile_A --incognito<p>chromium-browser --user-data-dir=&#x2F;tmp&#x2F;profile_B<p>chromium-browser --user-data-dir=&#x2F;tmp&#x2F;profile_B --incognito<p>For each command + its incognito it can detect them as separate profiles.<p>For ultimate privacy one needs to everytime launch browser with a new profile.
评论 #35243719 未加载
评论 #35244045 未加载
评论 #35244203 未加载
评论 #35244170 未加载
ergonaughtabout 2 years ago
Even after discovering it is worse than they thought, it remains far worse than the author thinks.<p>Public knowledge is far behind the actual capabilities in practice.
评论 #35245726 未加载
momentoftopabout 2 years ago
I don&#x27;t understand the test on this page. It says we should be worried because a fingerprinting website generates the same hash even after you clear your cache and site-data, and even if you go into a private tab. But I&#x27;m not overly concerned by this, provided I share that hash with other people.<p>The worry would be that the hash is unique to me (i.e. a fingerprint), but I don&#x27;t see the evidence that it is.
评论 #35243637 未加载
评论 #35243557 未加载
评论 #35243560 未加载
评论 #35243556 未加载
评论 #35243591 未加载
评论 #35244753 未加载
bawolffabout 2 years ago
I dont think this is a proper way to test it.<p>It matters more how unique your fingerprint is than how consistent or reproducible it is. Just testing if you get the same fingerprint back on your second visit doesn&#x27;t tell you much if you don&#x27;t know how many people &quot;share&quot; your fingerprint.<p>As a silly example, if you gave all users the same fingerprint, it would be very consistent but also useless as a tracking method.
评论 #35245481 未加载
danbrucabout 2 years ago
Can we fingerprint fingerprinting code and block it? At first glance it seems like code accessing all kinds of unrelated high entropy APIs should be something detectable. But then static analysis might be too hard in face of obfuscation so it would have to be done using dynamic analysis which kind of means you let the fingerprinting happen but are now at least aware of it. So how do you prevent the fingerprint from being used? In principle one could maybe mark values from entropy sources as tainted [1] an taint all the variables potentially influenced by those values and prevent them from leaving the browser. Not sure if this would be practical and I am even more skeptical that this could be easily added to existing browsers.<p>[1] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Taint_checking" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Taint_checking</a>
评论 #35244387 未加载
textreadabout 2 years ago
EFF has an excellent tool to check your browser&#x27;s fingerprint uniqueness:-<p><a href="https:&#x2F;&#x2F;coveryourtracks.eff.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;coveryourtracks.eff.org&#x2F;</a><p>I use a lot of browser extensions. Unfortunately, this makes my browser easily identifiable.
评论 #35248671 未加载
beeforporkabout 2 years ago
When I switched off fingerprinting in this browser, the font size here on Hacker News changed. I suppose it just uses the user agent to set a certain font size, or does Hacker News track based on fingerprinting?
评论 #35244214 未加载
评论 #35244392 未加载
comfypotatoabout 2 years ago
This author doesn’t seem to know what they’re talking about. Just because the service generated the same ID for their Chromium sessions doesn’t mean that applies to all users’ Chromium sessions. Chromium just exposes more of their machine. My guess is that they, writing a computer-technical blog post, have a particularly unique machine. Even having 16Gb of RAM separates you from the masses and might make you unique depending on graphics card etc..<p>The fingerprinting discussion is relatively new. The first research paper’s author is only 35 or so. (Its title is Cookie Monster.) The discussion is also a little amusing on a site like Hacker News. A perfect example of someone who’s easy to fingerprint is someone who built their own computer (likely to be found on HN). On the opposite end of the spectrum, Safari iPhone users with the same model are impossible to distinguish.<p>There’s a paper out there where the researchers worked with a public entity’s website to get more accurate fingerprinting data. There are very few unique fingerprints in reality and therefore no reason for any company to track them. This tech probably won’t ever identify users uniquely.<p>There are actually some positive aspects of fingerprinting. Tor leaves a very obvious fingerprint, and it’s easy for banks to detect its use by criminals.
brunoqcabout 2 years ago
I wonder if <a href="https:&#x2F;&#x2F;jshelter.org" rel="nofollow">https:&#x2F;&#x2F;jshelter.org</a> helps with that. And if it&#x27;s not too slow.
t0bia_sabout 2 years ago
Mull (FF fork on Android) and LibreWolf (FF fork on desktop) has privacy.resistFingerprinting = true by default. Highly recommended!<p><a href="https:&#x2F;&#x2F;f-droid.org&#x2F;en&#x2F;packages&#x2F;us.spotco.fennec_dos&#x2F;" rel="nofollow">https:&#x2F;&#x2F;f-droid.org&#x2F;en&#x2F;packages&#x2F;us.spotco.fennec_dos&#x2F;</a><p><a href="https:&#x2F;&#x2F;librewolf.net&#x2F;" rel="nofollow">https:&#x2F;&#x2F;librewolf.net&#x2F;</a>
评论 #35252770 未加载
royletronabout 2 years ago
I have a sort of love hate relationhip with this stuff. On the one hand, yes tracking me is bad if I am not aware, but on the other hand I work for a company that uses it&#x27;s expert knowledge to help consumers purchase the right tools for them. Ideally we would like the end product to reward us for putting them in touch with the right customer that we&#x27;ve used our name to help land. Much like a hairdresser would recommend a certain brand of hairspray, or a mechanic who carries their preferred oil - there is always a need for a middleman &#x27;tell Bob I sent ya!&#x27;. Obviously this an exception to a large majority of what tracking is currently in place for, but until we drop the whole &#x27;tracking is bad we should just shut it all down&#x27;, and start to think of a fair and reasonable way for users to say &#x27;I am ok with company B knowing that I have a relationship with company A&#x27; then these increasingly nerfarious tracking efforts will happen.
评论 #35246783 未加载
评论 #35246901 未加载
Technotrollabout 2 years ago
I&#x27;m just guessing here, but I&#x27;m fairly sure that they use a model that updates dynamically as the &quot;user&quot; or victim changes his or her web browsing settings, and even when the user tries to hide. It easily sounds like some kind of Bayesian filtering going on, or some sort of Markov Chain or decision tree. That is to say that their model tracks the likelihood that you&#x27;re the same unique user that reloads the page based on the information it can glean from you.<p>This makes it exceedingly hard to hide from such a filter, because in communicating with these sites, you are bound to reveal at least some information about yourself. And then the &quot;likelihood-machine&quot; does the rest by connecting the dots, even if you gave them &quot;fewer dots.&quot;<p>It&#x27;s also quite interesting - or perhaps chilling - to see how fingerprinting through NLP and other language tracking algorithms can also track just about any forum post you do, even if you&#x27;re using a pseudonym.
zer00eyzabout 2 years ago
Target and the model that found the pregnant girl (bad counter argument here: <a href="https:&#x2F;&#x2F;medium.com&#x2F;@colin.fraser&#x2F;target-didnt-figure-out-a-teen-girl-was-pregnant-before-her-father-did-a6be13b973a5" rel="nofollow">https:&#x2F;&#x2F;medium.com&#x2F;@colin.fraser&#x2F;target-didnt-figure-out-a-t...</a><p>There are three options:<p>1. Prevent&#x2F;Stop it: This ship sailed long ago. Not to be grim about it but pandoras box got opened.<p>2. Fight it: Tool up, change your print, your behavior, your place. Build focused VM&#x27;s that you use per topic. Simply do a WHOLE lot less. In the grand scheme, its a lot of work for low return. Note: there are exceptions.<p>3. Increase Noise: The whole point of most data collection is to sell more to you. Because most people are sheep, a fairly simple model can be surprisingly accurate (over targeting is an issue). Don&#x27;t be a sheep, diversify, make more noise in the system, search out side your comfort zone and change it up often.
评论 #35244492 未加载
评论 #35244981 未加载
Jaer3hahabout 2 years ago
Well, I&#x27;m glad to report that my efforts to fight fingerprinting have paid off.<p>I use a text based browser, with no js, no cookies, no css, no external requests past the first html page download, no user agent, no etag, I connect through Tor and I&#x27;ve modified the browser to randomize http headers. And of course, it sometimes happens that I want to see something that is refused to me with that configuration (like, seeing anything behind the big internet killer, aka Cloudflare - thanks archive.org for existing), so I have also a classic browser for the occasional lowering of barrier.<p>At first, I thought fingerprint.com did identify it, giving me the hZ4W5oQ7pJVIHbW2fBXA id. Then I realized it was giving the same id when using curl with and without Tor. Then I realized, by googling and ddging that id that it&#x27;s the one reported as well to search engines. So it&#x27;s not unique and it&#x27;s basically a &quot;dunno&quot; reply.
throwaway202302about 2 years ago
Oh, finally I found an element of distinguation for the Iphone:<p>The zoom settings in the display&#x2F;brightness section of the iphone seem quite relevant for fingerprint.com algorithm.<p>Toggling between standard&#x2F;bigger text toggles the fingerprint value.<p>This could be because the visible area in the screen size changes, as well as some value of the CSS-fingerprint.
npteljesabout 2 years ago
Fingerprint.com gives me different IDs across different tabs, and also in private mode. I guess the privacy setup still works somewhat. The stack I use:<p>- Firefox, Enhanced Tracking Protection ON<p>- Multi-Account Containers + Temporary Containers addon<p>- Privacy Settings addon, most settings private, but referrers enabled<p>- uBO with lots enabled, Decentraleyes addon
mwexlerabout 2 years ago
The EFF has tried to get folks to pay attention to this for years. See <a href="https:&#x2F;&#x2F;coveryourtracks.eff.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;coveryourtracks.eff.org&#x2F;</a> aka Panopticlick<p>And it probably understates the problem these days, missing some of the more recent techniques.
cmrdporcupineabout 2 years ago
Fingerprinting is one of those things where there&#x27;s really been a slippery slope we&#x27;ve just slid further and further down it over the last decade; back when I worked at an ad-tech startup (almost 15 years ago) I ran an experiment myself with our data to see if a simple hash of IP, browser agent, and maybe a couple other signals we had in our logs (don&#x27;t recall) would co-relate with the cookies we already had through cookie matching from other sources. And the answer was: yes, about 95% of the time. Enough to be reliable enough to do basic retargeting without worrying about excessive false matches.<p>But at the time, it was considered to be a big <i>do not touch</i> -- just don&#x27;t do this. Not so much for ethical reasons, but for optics in the industry. (I wasn&#x27;t proposing doing it, was just curious)<p>In the meantime, though, this seems to have just become standard practice, but <i>way more sophisticated</i> with way higher accuracy, as this article touches on.<p>What was not acceptable a decade ago is now &quot;ok.&quot; Not just by sketchy ad startups, but by major players.<p>But this whole mess ties back to one of the things that worries me the most about the propagation of LLM type ML out into the general industry. It&#x27;s only a matter of time before ad targeting takes on an extra dimension of creepiness through this (and I&#x27;m sure it&#x27;s already happening in some aspects, inside Google &amp; Meta.)<p>In the past, in ad tech &amp; search, etc. people could say things like: <i>&quot;Yes, it&#x27;s highly targeted. Yes we&#x27;ve co-related an absolutely huge quantity of data to fingerprint you exactly, and retarget you. But it&#x27;s anonymized. No humans saw your personal data. It&#x27;s just statistics.&quot;</i>. Not saying whether or not this argument has merit or not, just repeating it.<p>But now, here we are, where <i>&quot;just statistics&quot;</i> is a far more intricate learning model. One which is capable not just of corelating your purchases and browsing activity, but of &quot;understanding&quot; you, and which -- while not an AGI -- is pretty damn smart.<p>At what point does &quot;a computer scanned your browsing for patterns and recommend this TV set&quot; become ethically the <i>same</i> as &quot;a human read your logs, and would like to talk to you about television sets...&quot;?<p>Having worked in ad-tech before (and having worked at Google, in ads and other things as well), I do <i>not</i> trust the people in that industry to make the right decisions here.
reportgunnerabout 2 years ago
Seems like a disguised ad for that fingerprinting service. Resist fingerprinting was already set to true in my Firefox. &quot;Worse than I thought&quot; apparently means &quot;I thought there was no fingerprinting but I found out there is fingerprinting.&quot;
评论 #35247458 未加载
jefc1111about 2 years ago
Is anyone trying to tie users to multiple devices, and consequently identify both fingerprints as being from one user? I.e. Let&#x27;s say I visit HN on both my laptop and on my mobile phone, each will have a very different fingerprint, but not only do I visit the same site on both devices but I am unlikely to do so simultaneously across the two devices, and there are likely to be other factors such as not visiting on either device during sleeping hours, not visiting on either device before some date (i.e. when I got into HN).<p>Perhaps you could call this something like &#x27;cross-device fingerprint unification&#x27;, idk.
评论 #35245749 未加载
评论 #35245841 未加载
评论 #35248042 未加载
aktuelabout 2 years ago
If I have a certain phone model with updates applied. Is there something that distinguishes me from other people with the same phone and browser version other than the IP address?
评论 #35245758 未加载
评论 #35245484 未加载
评论 #35245978 未加载
AtNightWeCodeabout 2 years ago
&quot;Given there are companies selling fingerprinting as a service, if you want to really protect yourself from fingerprinting, you should use Tor Browser or Firefox with resistFingerprinting=true.&quot;<p>Fingerprinting services tries to figure out browsing settings. Since very few people have this feature enabled. You might be easier to fingerprint by enabling it. A metric that historically been used for fingerprinting is the &quot;do not track&quot; feature which is a bit of irony.
cobbautabout 2 years ago
How many websites do you need to visit before being unique in the world?<p>Say I follow AS Monaco football, then look for Lego Castle figurines and finally visit a forum on Alaskan Malamute dogs. The combination of these three websites is pretty close to unique in the world imho.<p>Surely most people can be uniquely identified after visiting a couple more, unless we change browser and ip-address and GPU and set resistFingerprinting=true and ... and clear cookies after every website we visit.
IvanK_netabout 2 years ago
The idea of the Incognito mode is, that the website should be unable to detect that you are using the Incognito mode.<p>There is a bug in Chorme, which I reported, but they told me they will not fix it: <a href="https:&#x2F;&#x2F;bugs.chromium.org&#x2F;p&#x2F;chromium&#x2F;issues&#x2F;detail?id=1204850" rel="nofollow">https:&#x2F;&#x2F;bugs.chromium.org&#x2F;p&#x2F;chromium&#x2F;issues&#x2F;detail?id=120485...</a>
评论 #35244670 未加载
switch007about 2 years ago
On iOS I visited fingerprint.com on safari twice and then opened used Brave with its “Block fingerprinting” setting enabled and it registered it as my third visit! They should label it as “resist” as it’s a lot more honest<p>And <a href="https:&#x2F;&#x2F;www.amiunique.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.amiunique.org&#x2F;</a> says I’m unique in Brave compared to “nearly” in Safari haha
评论 #35247471 未加载
tomxorabout 2 years ago
I think Firefox might actually enable this by default for third party sites, but not 100% what this about:config one does:<p><pre><code> privacy.trackingprotection.fingerprinting.enabled </code></pre> This would make sense since messing with values for the root frame could cause unwanted side effects, but you&#x27;re not likely to care if some iframe gets your screen resolution or CPU count wrong.
DavideNLabout 2 years ago
Strange, `privacy.resistFingerprinting = true` did not solve the issue for me, i&#x27;m still fingerprinted by <a href="https:&#x2F;&#x2F;fingerprint.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;fingerprint.com&#x2F;</a>. Even after clearing all cache and restarting Firefox.<p>Adding the extensions `Canvasblocker` and `Temporariy Containers` did solve the issue though.
giancarlostoroabout 2 years ago
Anyone know if there&#x27;s been any forks of Chrome that enforce more privacy features? I know Chromium is a thing, but I doubt the builds for Chromium (except when tweaked by some Linux distros) do much like Firefox does.<p>I only use Chrome to test some things, or to create a completely isolated browser session disconnected from my use of Firefox.
评论 #35246025 未加载
jamesfisherabout 2 years ago
Why do these systems use hash-based fingerprinting? Wouldn&#x27;t it be &quot;better&quot; to have a &quot;browserspace vector&quot;, or &quot;browser embedding&quot;? So that if one fingerprint tactic fails in incognito, you don&#x27;t completely lose the fingerprint, you just get a slightly different vector?
throwaway202302about 2 years ago
Is someone here working at apple?<p><a href="https:&#x2F;&#x2F;niespodd.github.io&#x2F;webrtc-local-ip-leak&#x2F;" rel="nofollow">https:&#x2F;&#x2F;niespodd.github.io&#x2F;webrtc-local-ip-leak&#x2F;</a> still? leaks local IP in mobile safari. On browserleaks local ip check fails, giving false feeling of safety.
shashashankabout 2 years ago
I remember once in college I&#x27;d shared my phone&#x27;s hotspot to connect a TV to the internet after it had abruptly stopped working. And all of a sudden the ads being shown (on YouTube) switched from the local language to mine, both of which are completely different.
评论 #35245268 未加载
unrequitedabout 2 years ago
Asking the wider audience here, I have uBlock origin installed on my Chrome browser, while I surf mostly on the incognito mode. I know this is no where close to an optimum setup, hence asking. What setup do you folks use to prevent the best you could from being tracked?
neop1xabout 2 years ago
It is even worse than the OP realizes. They should run these EFF tests [1] to see how severe the problem is and that it is practically impossible to combat.<p>[1] <a href="https:&#x2F;&#x2F;coveryourtracks.eff.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;coveryourtracks.eff.org&#x2F;</a>
_Mobius_about 2 years ago
I tested this myself with librewolf and firefox. Librewolf that is supposed to be hardened and has resistFingerpinting by default couldn&#x27;t stand a chance. The visitor ID was always the same in Librewolf. In Firefox the visitor ID was always different.
raverbashingabout 2 years ago
There&#x27;s a flipside question as well, how many users have the same fingerprint as you?
评论 #35244350 未加载
dariosalvi78about 2 years ago
the problem is that the alternative, that is native applications, is even worse. Let&#x27;s face it, some level of identification comes with networking, there are ways to anonymize connections, but none is perfect.<p>Tracking should be limited with legal means.
Operative0198about 2 years ago
As another vote against JS, this website is able to accurately tell at least half of the extensions I have installed on chrome.<p><a href="https:&#x2F;&#x2F;browserleaks.com&#x2F;chrome" rel="nofollow">https:&#x2F;&#x2F;browserleaks.com&#x2F;chrome</a>
domhabout 2 years ago
I just tried to turn on `resistFingerprinting` in Firefox and it meant that my zoom preference for HN got reset every time I opened a new page (I have it set to 120% by default). Anyone know why? Bug?
评论 #35245786 未加载
xkcd1963about 2 years ago
I guess we could hijack our browsers to lie about the parameters that are being collected at the fingerprinting, that would be far more convenient than disable JS etc.<p>EDIT: Or block the extraction
sluuuuurpeyabout 2 years ago
If you buy two of the same exact model iPhone and boot&#x2F;config IDENTICALLY, on the same Wi-Fi network, they would have the same fingerprint, right?
OOPManabout 2 years ago
Tested fingerprint.com with Vivaldi Mobile and it didn&#x27;t correlate me across a norm tab and an Incognito one, so it&#x27;s not fool foolproof...
aaronrobertabout 2 years ago
From my testing, this doesn&#x27;t seem to work on Safari. But it actually works on Chrome. Another reason for using Safari instead of Chrome.
chrisMyzelabout 2 years ago
I find it scary coming back to the fingerprint.js site after years and still being correctly identified and see the exact dates I visited
评论 #35245691 未加载
oellegaardabout 2 years ago
Actually quite surprised to see that this identifies me on Safari in Incognito, after visiting in regular mode first.
评论 #35243522 未加载
victorbjorklundabout 2 years ago
Damn yea I didn&#x27;t know it was so easy to do in practice (I just heard about theoretical approaches)
EastSmithabout 2 years ago
It is sad that Brave + uBlock Origin + DDG Privacy Essentials does not seem to be able to fight this.
评论 #35245927 未加载
someoneFromWebabout 2 years ago
I tested it on Brave mobile (Android) and I got different fingerprint each time
fnord77about 2 years ago
the demo got my browser totally wrong. it has me showing up in various places around the country and I don&#x27;t use a VPN. One of the dates I was out of the country and my laptop was at home, turned off
评论 #35263264 未加载
darefalconabout 2 years ago
“Worlds most accurate”: Source, fingerprintjs. Sounds legit.
KoftaBobabout 2 years ago
I was able to &quot;trick&quot; the fingerprint.com test by opening it first with firefox, then with tor browser. Gave two different visitor IDs. So as suspected, it largely relies on IP address.
评论 #35244262 未加载
giuliomagnificoabout 2 years ago
It would be nice to have also the Safari evaluation.
dean2432about 2 years ago
with resist fingerprinting enabled in FF, it resets the zoom level i have set on each individual site, so it&#x27;s just annoying.
dcowabout 2 years ago
In hindsight it’s clear. Why did we allow the web advertising mega corp to own the browser we use? Huge conflict of interest. There’s no way our privacy was going to survive.
funstuff007about 2 years ago
We use web fingerprinting and adjacent methods to crack down on ID sharing for our SaaS that charges (per person). I make no apologies for this practice.
评论 #35248937 未加载
alkonautabout 2 years ago
What is the use case for these fingerprints when adhering to the GDPR? You can&#x27;t store them in a DB and use them to target your returning anonymous visitor with products relevant to their last visit. You can&#x27;t send them to a third party ad service to get more relevant ads. Isn&#x27;t the whole point of the fingerprint to maintain an pseudonym for your users over some time window? But that requires storing them which would be against the GDPR?
评论 #35244176 未加载
helsinkiandrewabout 2 years ago
Surely if your website collects data using browser fingerprinting this is covered by GDPR and you have to tell your visitors&#x2F;ask for permission?<p><a href="https:&#x2F;&#x2F;www.eff.org&#x2F;deeplinks&#x2F;2018&#x2F;06&#x2F;gdpr-and-browser-fingerprinting-how-it-changes-game-sneakiest-web-trackers" rel="nofollow">https:&#x2F;&#x2F;www.eff.org&#x2F;deeplinks&#x2F;2018&#x2F;06&#x2F;gdpr-and-browser-finge...</a>
评论 #35244423 未加载
评论 #35243743 未加载
评论 #35243629 未加载
estabout 2 years ago
What the world needs:<p>&lt;body onload=&quot;javascript.disable()&quot;&gt;
toldyouso2022about 2 years ago
GDPR should have been approached at browser level. But there would not have been money to make for those that provide &quot;compliant&quot; banners. I guess the economy needed the stimulus.
评论 #35244586 未加载
评论 #35243552 未加载
评论 #35243573 未加载
评论 #35243587 未加载
评论 #35243639 未加载
illiarianabout 2 years ago
Note also: As the number of APIs increases, so does the fingerprinting. E.g. MIDI device enumeration (no prompt in Chrome, prompt in FF, not implemented in Safari): <a href="https:&#x2F;&#x2F;twitter.com&#x2F;denschub&#x2F;status&#x2F;1582730985778556931?s=20" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;denschub&#x2F;status&#x2F;1582730985778556931?s=20</a>
评论 #35244355 未加载
评论 #35244778 未加载
评论 #35245122 未加载
throwawayacc5about 2 years ago
Is there a firecracker VM or something similar that comes preconfigured with a browser and VNC&#x2F;RDP that can be used like a native browser but is running in a VM that&#x27;s not fingerprintable?
Semaphorabout 2 years ago
For anyone who this is news to: This is why I always call the &quot;I don&#x27;t care about cookies&quot; extension an adtech submarine, because it deceives you into thinking it’s all about cookies, when the permission you give automatically in many cases are about tracking, so using that extension will often have you consent that fingerprinting you and creating a profile based on that is perfectly fine.
评论 #35244096 未加载
评论 #35244027 未加载
1vuio0pswjnm7about 2 years ago
&quot;That&#x27;s how web works.&quot;<p>Nah. I make an HTTP request and I get a response. That&#x27;s how the web works. Perhaps people can have different opinions on &quot;how the web works&quot;.<p>Web fingerprinting relies on a heap of assumptions. For example, that someone uses a web browser to make HTTP requests, that the web browser sends certain HTTP headers in a certain order, that the web browser runs Javascript, that it processes cookies, recognises HSTS response headers, and so on and so on.<p>If all the assumptions are true, maybe web fingerprinting is effective. But if the assumptions fail, maybe web fingerprinting does not work so well.<p>I have only ever read blog posts about web fingerprinting that take all the assumptions as true.<p>The majority of traffic on the internet is said to be &quot;bots&quot;. Not web browsers running Javascript, processing cookies, and so on.<p>It seems to me that someone should discuss what happens when the assumptions fail.<p>Do advertisers care about computer users who do not use graphical browsers much. As such a user, IME, the answer is no.<p>(Interesting to see how defensive replies get. It&#x27;s obvious the &quot;tech&quot; crowd intent to spy on web users is heavily reliant on certain assumptions to remain true forever. It shows that there is necessary pressure to keep web users using a &quot;preferred&quot; web browser and web &quot;&quot;features&quot; that will subject them to &quot;web fingerprinting&quot;. Perhaps the assumptions will always be true, conditions will never change, in the same way that interest rates could never change.)
评论 #35243668 未加载
评论 #35244361 未加载
评论 #35243834 未加载
评论 #35243785 未加载