Ad Networks use browser fingerprinting to detect duplicate clicks, which is tied to your hardware, system locale, installed fonts etc.
Ad Networks use browser fingerprinting to detect duplicate clicks, which is tied to your hardware, system locale, installed fonts etc.
morphballganon@mtgzone.com 1 week ago
Sounds like a solvable problem
viking@infosec.pub 1 week ago
Chameleon add-on for Firefox, randomly rotates your browser, OS, screen size, timezone, device type, language, and other customizable parameters every x minutes.
I’ve set it to do so every 5 minutes, and to omit desktop & tablet as device types (else some websites display the respective page) and timezones (messed up 2FA).
I also disabled blackberry and windows phone from the manufacturer ID, that would have the opposite effect from obscuring me.
For the rest of it, it’s working great.
Psythik@lemm.ee 1 week ago
Tell me how, then, because I don’t know how to get around the font thing. Everybody’s computer has a different set of fonts, and blocking browsers from seeing what fonts you have installed would help identify you even more.
morphballganon@mtgzone.com 1 week ago
A browser extension that limits webpages to default Windows fonts only would eliminate that factor from contributing to identification without flagging it as suspicious. A slightly more robust version could frequently cycle between multiple subsets of default Windows fonts. Say Windows comes with 100 fonts. So you could have thousands of configurations with different subsets of those.
Cryophilia@lemmy.world 1 week ago
That one browser which everyone hates despite it being the best adblocker and anti-surveillance browser out there randomizes your fingerprint.
Tangent5280@lemmy.world 1 week ago
which one
bss03@infosec.pub 1 week ago
“Just” remove a random 2.5% of the fonts, a different random set per request (context).
FauxLiving@lemmy.world 1 week ago
Just have everyone agree on a set of fonts to report and report those.