this post was submitted on 22 Sep 2024
27 points (100.0% liked)

Privacy

31808 readers
364 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

Fingerprinting isn't always possible to defeat, and its not always possible to avoid making accounts (work and school accounts)

However, it should be possible to fill up tracked data with meaningless garbage and reduce the signal-to-noise ratio. Ex: a bot that browses random products on amazon to reduce profiling accuracy.

Do you guys know of any tools that do this? Anything from browser extensions to command line scripts, to anonymous group-accounts.

top 15 comments
sorted by: hot top controversial new old
[–] Charger8232@lemmy.ml 6 points 1 month ago* (last edited 1 month ago) (1 children)

Having your browser lie about every detail is anonymous, but not k-anonymous. i.e. Nobody will know who you are, but your browser fingerprint is unique and so you will not blend in with everyone else. The Tor Browser and Mullvad Browser try to be k-anonymous, so everyone looks the same. Brave Browser is an interesting case where all fingerprint data is randomized, so you are not by definition k-anonymous, but you do blend in with all other Brave users in that it is all randomized in the same way for everyone.

In summary:

  • Having your browser lie in a unique way is bad
  • Having your browser lie in the same way as everyone else is good
  • Having your browser lie in a random way like everyone else is still good
[–] refalo@programming.dev 5 points 1 month ago (1 children)

I would be very careful about saying Tor/Mullvad/Brave are anywhere near approaching k-anonymity... Tor Browser cannot even hide your real OS when queried from javascript, and there are current ways to detect all of those browsers independently.

I think one problem is that most people's (general non-tech population) browser setups are completely bone-stock, and so by definition "random like everyone else" is likely already excluding all the stock users and placing you in a much smaller box to compare against.

[–] Charger8232@lemmy.ml 3 points 1 month ago (3 children)

I would be very careful about saying Tor/Mullvad/Brave are anywhere near approaching k-anonymity

I agree, but it's the best we have so far. If you take some time to sit down and think about it, a lot of the problems with internet privacy can't be fixed without a complete overhaul of our existing systems.

Tor Browser cannot even hide your real OS when queried from javascript

This is true, but the exception is Tails which lies about being Windows.

[–] Deckweiss@lemmy.world 3 points 1 month ago* (last edited 1 month ago)

I wish I knew how tails does it so that I could make my Linux do it as well.

Edit: oh, it's just spoofing the user agent af far as I can see. That doesn't hide it being linux at all.

[–] Lemongrab@lemmy.one 3 points 1 month ago

Lying about your host OS does nothing to protect against OS fingerprinting. Your OS can still he determined through the differences in how each OS renders and handles the Browser, and underlying architectural differences between browsers on each OS.

[–] refalo@programming.dev 1 points 1 month ago (1 children)

Are you saying Tails has a custom fork of TBB that spoofs the OS? Do you have a link to that patch?

[–] Charger8232@lemmy.ml -1 points 1 month ago (1 children)

Tails is an operating system. Try booting into Tails yourself and use various websites to see what I'm talking about: All of them report your operating system to be Windows, despite Tails being based on Debian.

[–] refalo@programming.dev 1 points 1 month ago* (last edited 1 month ago)

Tails is an operating system

Yes, and it comes with Tor Browser, which normally does not spoof your OS when probed via javascript (only the user-agent), that is why I asked if you had a patch to the source code, which is what they would have to be using in order to do what you're saying.

All of them report your operating system to be Windows

As it stands, I am not able to verify your claims, as Tor Browser on Tails 6.7 is still showing the true OS via javascript queries for me:

https://0x0.st/XYZF.png

[–] guillem@aussie.zone 3 points 1 month ago* (last edited 1 month ago)

There's a page somewhere that, if you allow it to, opens hundreds of tabs in the background pointing to a bunch of lifestyle and commercial sites so your shadow profile ends up looking nothing like you. I will try to find it again.

And here it is: https://trackthis.link

[–] refalo@programming.dev 2 points 1 month ago* (last edited 1 month ago) (2 children)

Just FYI You would have to be using the same exact browser configuration you normally browse with, otherwise the fingerprint it has will be different.

[–] Lemongrab@lemmy.one 1 points 1 month ago* (last edited 1 month ago) (1 children)

Except for shared unique similarities. Fingerprinting designers know "not all data is good data" and will then filter out bad data and use hard to change charateristics, like hardware or software similarities, which can enable cross-browser fingerprinting.

[–] refalo@programming.dev 1 points 1 month ago (1 children)

What is a "shared unique similarity"? Sounds a lot like something that isn't unique to me...

[–] Lemongrab@lemmy.one 1 points 1 month ago

Unique to you, shared between your different browsers.

[–] jeffhykin@lemm.ee 1 points 1 month ago (1 children)

Yeah, cookies, account logins, and other stuff make it hard too. Ex: randomly exploring gmail emails at different times of day, but not actually marking emails as read.

[–] refalo@programming.dev 1 points 1 month ago* (last edited 1 month ago)

Right, even the most secure/private browser cannot help opsec failures... if only one person visits the same website(s) at the same time every day, you are not anonymous. But we all must define our own threat models and apply what's realistic for us individually.