That’s the point. It doesn’t matter how many middle layers there are, if you’re using a web browser, there are hundreds of pieces of information that can still be used to uniquely identify you. Do you have WebGL enabled? If so, you could be identified with 100 constantly changing proxies.
Comment on Browser Fingerprinting And Why VPNs Won’t Make You Anonymous
afox@lemmy.world 3 weeks ago
Good luck I’m behind 7 proxies
ZoteTheMighty@lemmy.zip 3 weeks ago
Nighed@feddit.uk 3 weeks ago
If you go to the site, what does it think of your fingerprint?
undefined@lemmy.hogru.ch 3 weeks ago
I’m here with multi-hop VPN with the first two hops staying in-country and the rest all random + a shit load of DNS blocking lists and browser extensions + blocking Google. I use different VPN providers too. I’m also introducing variable delays to my traffic to make NetFilter data less helpful.
GreenShimada@lemmy.world 3 weeks ago
Please understand that browser extensions make you more easy to track. I used to be under the same assumption, but uBO is as far as you should go. fingerprints include your extensions.
undefined@lemmy.hogru.ch 3 weeks ago
My thinking is that most of the fingerprinting is happening by third parties, and where it’s the website operators themselves I’m not super concerned about being fingerprinted.
GreenShimada@lemmy.world 3 weeks ago
Look at the uBO trackers on each site and you’ll br surprised how often Google comes up.
artyom@piefed.social 3 weeks ago
That depends on whether your browser exposes them, and if/how they affect your fingerprint. If you go to deviceinfo.me it will show you what your browser is exposing.
GreenShimada@lemmy.world 3 weeks ago
Yeah, there’s also the hidemytracks.eff.org and amiunique.org and abrahamjuliot.github.io/creepjs/index.html which is my favorite
hietsu@sopuli.xyz 3 weeks ago
artyom@piefed.social 3 weeks ago
Some privacy browsers will randomize your fingerprint
hietsu@sopuli.xyz 3 weeks ago
Anivia@feddit.org 3 weeks ago
Laughs in Tails Linux
undefined@lemmy.hogru.ch 3 weeks ago
Right, that’s why I mentioned all the blocking at the DNS and browser extension level — most fingerprinting is being done by third-parties — I generally don’t see first parties fingerprinting but if they do it’s likely a website I chose to be on rather than some shady
<script>from God knows where.