Damn… I guess the next idea is going offline for good

  • SteveCC@lemmy.world
    link
    fedilink
    arrow-up
    13
    ·
    10 hours ago

    Back in the day there were apps that generated phony web searches to obfuscate your real searches. Seems like there could be tools to mess around and change browser fingerprints periodically. No?

      • PiraHxCx@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        ·
        48 minutes ago

        Interesting… Tor, Mullvad, and other secure browsers, go to the exact opposite approach, though… they try to make everyone look the same so they can’t tell you apart across IPs

    • pumpkin_spice@lemmy.today
      link
      fedilink
      arrow-up
      1
      ·
      3 hours ago

      There is a browser extension called Chameleon that will spoof a fair amount of data, but after testing it against one of those fingerprint test sites, it looks like it doesn’t/can’t spoof everything.

    • jimi_henrik@lemmy.world
      link
      fedilink
      arrow-up
      6
      ·
      9 hours ago

      It could be done on the browser level (maybe it’s something browsers like LibreWolf do), however, it would break sites that require the fingerprints to be the same for “security reasons” which may or may not be a legitimate claim.

      You could say “well, I’m not going to use that particular website then”, but the problem is that there are less and less websites that don’t require these technologies to function properly.

      • MonkderVierte@lemmy.zip
        link
        fedilink
        arrow-up
        4
        ·
        6 hours ago

        And Canvas Blocker (which only optionally blocks but randomizes them). But Firefox has that built-in now; canvas fingerprinting should be pretty much useless there.