logoalt Hacker News

gioboxyesterday at 1:28 AM3 repliesview on HN

The EFF's fingerprint test is nice in that it breaks down a lot of the bits of data used, and lets you know how you compare etc:

> https://coveryourtracks.eff.org/

You quickly discover how difficult it really is to avoid a unique fingerprint.

Lots of folks in this thread are focusing on DNS and VPN to avoid detection, which of course can help, but a huge number of identifiable bits come from your browser's APIs:

User Agent

Screen Size and Color Depth

System Fonts

Hash of canvas fingerprint

Hash of WebGL fingerprint

WebGL Vendor & Renderer

Touch Support

AudioContext fingerprint

Hardware Concurrency

Device Memory

Platform

Language

Timezone

Timezone offset

Browser Plugin Details

etc etc


Replies

Scroungeryesterday at 1:42 AM

> https://coveryourtracks.eff.org/

I get "Our tests indicate that you have some protection against Web tracking, but it has some gaps." but nothing of too much importance I think.

I use a VPN and NextDNS.io.

show 1 reply
Mars008yesterday at 2:06 AM

In Tor got: "Our tests indicate that you have you have strong protection against Web tracking."

In normal Firefox: "uBlock Origin has prevented the following page from loading:

https://eviltracker.net/kcarter-reporting-nojs?a="

In normal Firefox with 'real tracking company' ON (default): "uBlock Origin has prevented the following page from loading:

https://trackersimulator.org/kcarter-reporting-nojs"

Sort of failed?

show 1 reply
dakolliyesterday at 1:56 AM

Do not trust the EFF !!!