• JustVik@lemmy.ml
    link
    fedilink
    English
    arrow-up
    2
    ·
    13 hours ago

    It constantly gives me 17.5 bits on several browsers firefox, nyxt, gnu icecat, librewolf…

  • dwindling7373@feddit.it
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    1
    ·
    2 days ago

    Am I wrong to assume trying to blend in is a worse and contradictory strategy than trying to actively protect yourself from tracking?

    If you want to not be unique, use default setting chrome without adblock. Your browser will look just like anybody else’s, but they will literally know who you are.

    On the opposite side of the spectrum, you lock everything down and spike as a very special browser and… that’s all they know.

      • dwindling7373@feddit.it
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 day ago

        Not what I meant: https://github.com/arkenfox/user.js/wiki/3.3-Overrides-[To-RFP-or-Not]#-fingerprinting

        "If you do nothing on desktop, you are already uniquely identifiable - screen, window and font metrics alone are probably enough - add timezone name, preferred languages, and several dozen other metrics and it is game over. Here is a link to the results of a study done in 2016 showing a 99.24% unique hit rate (and that is excluding IP addresses).

        Changing a few prefs from default is not going to make you “more unique” - there is no such thing."

        Basically making yourself less unique is impossible so there’s no sensible tradeoff to be made (other than in the context of Tor and Mullvad Browser).

      • underwire212@lemm.ee
        link
        fedilink
        arrow-up
        3
        ·
        2 days ago

        Right. The question is whether they can attach what they know to an identity. Depends on your threat model which goal you need to achieve.

    • ivn@jlai.lu
      link
      fedilink
      English
      arrow-up
      13
      ·
      edit-2
      2 days ago

      But then they can know a lot more since they don’t even need to drop a cookie to track you. But that’s a different threat model.

    • LambdaRX@sh.itjust.worksOP
      link
      fedilink
      arrow-up
      4
      ·
      edit-2
      1 day ago

      They probably give entropy value, average number of, yes or no, questions that are needed to identify You. (Guess all the information that your browser provided)

  • Pika@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    5
    ·
    2 days ago

    Your browser fingerprint appears to be unique among the 183,951 tested in the past 45 days.

    Currently, we estimate that your browser has a fingerprint that conveys at least 17.49 bits of identifying information.

    well shoot my mobile failed that test lmao

      • Random Dent@lemmy.ml
        link
        fedilink
        English
        arrow-up
        6
        ·
        2 days ago

        I got exactly that number too, but also when I looked at the detailed results section lots of it was incorrect. It got that I was on some sort of Linux and using some sort of FF variant, but things like time zone, plugins, screen resolution and system fonts were all wrong.

        So sending out 17.49 bits of largely identifying bullshit is still okay I think lol.

  • Viri4thus@feddit.org
    link
    fedilink
    arrow-up
    53
    ·
    3 days ago

    If you have canvas randomisation turned on (firefox) you’ll always be unique but also not traceable between sessions.

    • ipkpjersi@lemmy.ml
      link
      fedilink
      arrow-up
      4
      ·
      1 day ago

      How do you turn on canvas randomisation in Firefox? I can’t seem to find anything about it.

      • Muehe@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        20 hours ago

        I found this in about:config, defaults to true apparently: privacy.resistFingerprinting.randomDataOnCanvasExtract

        But you have to enable privacy.resistFingerprinting for it to work first. I enabled that and now the EFF test says “randomized” for the hashes but also Lemmy went from dark to light theme somehow.

    • OmegaLemmy@discuss.online
      link
      fedilink
      arrow-up
      1
      ·
      1 day ago

      Didn’t know Vivaldi had this capability, I just used it because it was the only decent browser with an on/off sidebar till zen

      • Boomkop3@reddthat.com
        link
        fedilink
        arrow-up
        7
        ·
        2 days ago

        …as long as you are blocking tracking cookies, and aren’t on a session with a website that’s tracking you.

        Otherwise, you just have a nice unique hash in your cookies. A password manager could help here.

  • eleitl@lemm.ee
    link
    fedilink
    arrow-up
    4
    ·
    2 days ago

    Vanadium: Your Results Within our dataset of several hundred thousand visitors tested in the past 45 days, only one in 61101.0 browsers have the same fingerprint as yours.

    Currently, we estimate that your browser has a fingerprint that conveys 15.9 bits of identifying information.

  • ExcessShiv@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    27
    ·
    edit-2
    3 days ago

    With browser settings that actually let me use the internet in a way that’s not overly cumbersome and annoying, I get 16bits or something and a “nearly unique fingerprint”

    • themoonisacheese@sh.itjust.works
      link
      fedilink
      arrow-up
      10
      ·
      3 days ago

      Block any and all ads, then it doesn’t matter that they have your data if they can’t make money off of it (they still will do that by creating data aggregates but you can’t control that)

  • akkajdh999@programming.dev
    link
    fedilink
    arrow-up
    19
    ·
    3 days ago

    "Your browser fingerprint appears to be unique among the 183,614 tested in the past 45 days.

    Currently, we estimate that your browser has a fingerprint that conveys at least 17.49 bits of identifying information."

    Chat am I cooked?

    • yonder@sh.itjust.works
      link
      fedilink
      arrow-up
      8
      ·
      3 days ago

      Same result here. I’m using Gnome-web, which is already pretty niche, so that probably really lowers my score.

  • kekmacska
    link
    fedilink
    English
    arrow-up
    6
    ·
    2 days ago

    16.47 on Cromite. But most of the identify information is not even true, almost everything is spoofed. User agent, timezone, operating system, browser name, screen size and color depth, device, even the battery percentage

  • LittleBobbyTables@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    4
    ·
    2 days ago

    I get 8.44 bits (1 in 347.34 browsers). I use Firefox with Arkenfox user.js applied on top, with some of my own custom overrides.

    However, I think the biggest factor could be because I have Ublock Origin set to medium-hard mode (block 1st party scripts, 3rd party scripts and 3rd party iframes by default on all websites), so the lack of JavaScript heavily affects what non-whitelisted websites can track. I did whitelist 1st-party scripts on the main domain for this test (coveryourtracks.eff.org), but all the ‘tracker’ site redirects stay off the whitelist.

    I actually had to allow Ublock Origin to temporarily visit the tracker sites for the test to properly finish–otherwise it gives me a big warning that I’m about to visit a domain on the filter list.

  • bdonvr@thelemmy.club
    link
    fedilink
    arrow-up
    11
    ·
    3 days ago

    Your browser fingerprint appears to be unique among the 183,996 tested in the past 45 days.

    :(