Ad Networks use browser fingerprinting to detect duplicate clicks, which is tied to your hardware, system locale, installed fonts etc.
Ad Networks use browser fingerprinting to detect duplicate clicks, which is tied to your hardware, system locale, installed fonts etc.
morphballganon@mtgzone.com 5 weeks ago
Sounds like a solvable problem
viking@infosec.pub 5 weeks ago
Chameleon add-on for Firefox, randomly rotates your browser, OS, screen size, timezone, device type, language, and other customizable parameters every x minutes.
I’ve set it to do so every 5 minutes, and to omit desktop & tablet as device types (else some websites display the respective page) and timezones (messed up 2FA).
I also disabled blackberry and windows phone from the manufacturer ID, that would have the opposite effect from obscuring me.
For the rest of it, it’s working great.
Psythik@lemm.ee 5 weeks ago
Tell me how, then, because I don’t know how to get around the font thing. Everybody’s computer has a different set of fonts, and blocking browsers from seeing what fonts you have installed would help identify you even more.
morphballganon@mtgzone.com 5 weeks ago
A browser extension that limits webpages to default Windows fonts only would eliminate that factor from contributing to identification without flagging it as suspicious. A slightly more robust version could frequently cycle between multiple subsets of default Windows fonts. Say Windows comes with 100 fonts. So you could have thousands of configurations with different subsets of those.
Cryophilia@lemmy.world 5 weeks ago
That one browser which everyone hates despite it being the best adblocker and anti-surveillance browser out there randomizes your fingerprint.
Tangent5280@lemmy.world 5 weeks ago
which one
bss03@infosec.pub 5 weeks ago
“Just” remove a random 2.5% of the fonts, a different random set per request (context).
FauxLiving@lemmy.world 5 weeks ago
Just have everyone agree on a set of fonts to report and report those.