logoalt Hacker News

Cider9986yesterday at 11:50 PM10 repliesview on HN

I am not sure that ad blocking is enough now or in the future as fingerprinting is extremely hard to fight while keeping a convenient web experience. Of course, continue blocking for convenience, but for privacy, more robust solutions are needed. Try to beat this: https://fingerprint.com


Replies

PostOncetoday at 12:25 AM

Beginning to wonder if convenience is the root of all evil, and not money. Money's just a proxy for convenience.

More of us should learn to do things the hard way more often, and to be familiar with less-convenient things. There are life-changing advantages to doing things the hard way at least some of the time.

show 6 replies
Zaktoday at 12:17 AM

I beat it with Firefox, UBO, standard Firefox advanced tracking protection, and a VPN.

It was able to track me as long as my IP address didn't change, but as soon as I switched VPN endpoints, it gave me a new identifier.

show 3 replies
gioboxtoday at 1:28 AM

The EFF's fingerprint test is nice in that it breaks down a lot of the bits of data used, and lets you know how you compare etc:

> https://coveryourtracks.eff.org/

You quickly discover how difficult it really is to avoid a unique fingerprint.

Lots of folks in this thread are focusing on DNS and VPN to avoid detection, which of course can help, but a huge number of identifiable bits come from your browser's APIs:

User Agent

Screen Size and Color Depth

System Fonts

Hash of canvas fingerprint

Hash of WebGL fingerprint

WebGL Vendor & Renderer

Touch Support

AudioContext fingerprint

Hardware Concurrency

Device Memory

Platform

Language

Timezone

Timezone offset

Browser Plugin Details

etc etc

show 3 replies
newscrackertoday at 2:46 AM

> Try to beat this: https://fingerprint.com

I don’t know, but it seems like it’s overselling its capabilities. I tried with Firefox Focus and it said I’m using incognito (private mode) and assigned a unique visitor ID. Immediately tried with a private tab in Safari on iOS and it said I’m not using incognito (private mode) and assigned a new unique visitor ID. Then I switched networks and tried. One more unique visitor ID.

I’m not claiming that fingerprinting is not possible, but this website is not good at it. Seems like it uses plain cookies.

andaiyesterday at 11:56 PM

Doesn't this just identify you as "that one guy who blocks fingerprinting"?

It's similar to when you use Linux or an obscure privacy-preserving browser. You've made yourself way more unique just by doing that.

(I'm not sure how the math works out though, vs. actually running all that nasty tracking stuff.)

show 2 replies
allthetimetoday at 1:09 AM

What does "try to beat this" mean?

I just opened it in another browser and got another ID. Did I win?

For some reason using Microsoft Edge is deemed suspicious.

show 1 reply
LPisGoodtoday at 12:00 AM

iPhone with private relay seems to defeat that

t0lotoday at 1:41 AM

Use Mullvad Browser or Brave (both require no extensions to block ads, with mullvad browser being modelled off of tor. Use data traffic fingerprint obfuscation even behind vpn (yes they can tell if you're messaging, watching a video, torrenting, etc 90% of the time even behind vpn) use mullvads daita (makes packets the same size) or nymvpn (mixnet with tor like routing and in built delays). Tor doesn't protect against traffic analysis at all.

pabs3today at 3:51 AM

"Enable JS to run the demo"

Scroungertoday at 1:39 AM

> Try to beat this: https://fingerprint.com

I beat it, I think... nothing much there. I use a VPN and NextDNS.io.

show 1 reply