The EFF's fingerprint test is nice in that it breaks down a lot of the bits of data used, and lets you know how you compare etc:
> https://coveryourtracks.eff.org/
You quickly discover how difficult it really is to avoid a unique fingerprint.
Lots of folks in this thread are focusing on DNS and VPN to avoid detection, which of course can help, but a huge number of identifiable bits come from your browser's APIs:
User Agent
Screen Size and Color Depth
System Fonts
Hash of canvas fingerprint
Hash of WebGL fingerprint
WebGL Vendor & Renderer
Touch Support
AudioContext fingerprint
Hardware Concurrency
Device Memory
Platform
Language
Timezone
Timezone offset
Browser Plugin Details
etc etc
In Tor got: "Our tests indicate that you have you have strong protection against Web tracking."
In normal Firefox: "uBlock Origin has prevented the following page from loading:
https://eviltracker.net/kcarter-reporting-nojs?a="
In normal Firefox with 'real tracking company' ON (default): "uBlock Origin has prevented the following page from loading:
https://trackersimulator.org/kcarter-reporting-nojs"
Sort of failed?
Do not trust the EFF !!!
> https://coveryourtracks.eff.org/
I get "Our tests indicate that you have some protection against Web tracking, but it has some gaps." but nothing of too much importance I think.
I use a VPN and NextDNS.io.