On Librewolf i got 16.48 bits of information, on TOR browser 10.32 bits, but on Tails I managed to get only 9.3 bits.
I’m unique :) this ain’t great
its ok if your fingerprint changes on every browser startup
…as long as you are blocking tracking cookies, and aren’t on a session with a website that’s tracking you.
Otherwise, you just have a nice unique hash in your cookies. A password manager could help here.
A password manager? Could you explain why?
Cookies and other ways of keeping a session upright are kept by the browser. So unless you’re mad enough to copy cookies between devices, they prove you’re on the same device.
Using a password every time you log in, and letting your browser wipe everything on shutdown does not show websites wether you’re on yhe same or another device.
@Boomkop3 @broken_chatbot Do you mean not keeping browser history actually makes big difference? I do that for few years but wasn’t sure how much it really helped.
That does not matter, cookies and other local web storage can though
@Boomkop3 I mean full erase on shutdown, like in private window.
What would be considered a high score on this? Is 16 too high?
Within our dataset of several hundred thousand visitors tested in the past 45 days, only one in 91389.5 browsers have the same fingerprint as yours.
Currently, we estimate that your browser has a fingerprint that conveys 16.48 bits of identifying information
Doesn’t look good. How do you make it so that your browser doesn’t have a fingerprint at all?
Close it.
You can’t not have a finger print. You can a best try and look like everyone elses.Sadly the free market won’t care and as such you won’t blend with normal users. Still you can try and look like ever one else in the privacy community
If you have canvas randomisation turned on (firefox) you’ll always be unique but also not traceable between sessions.
How do you turn on canvas randomisation in Firefox? I can’t seem to find anything about it.
I found this in about:config, defaults to true apparently:
privacy.resistFingerprinting.randomDataOnCanvasExtract
But you have to enable
privacy.resistFingerprinting
for it to work first. I enabled that and now the EFF test says “randomized” for the hashes but also Lemmy went from dark to light theme somehow.privacy.resistFingerprinting breaks a lot more than just themes. Many of the weird problems reported in Firefox (and forks) are just from enabling it.
It has some pros but also TONNES of cons. Everything from a completely blank page to wrong timestamps to poor textures and so much more. Sometimes you will be flagged as a bot and prompted with literally infinite puzzles, thus effectively banning you from a website.
Some of these problems get fixed but new ones also get born. I personally use it but I also expect breakage and worse performance.
Yup, canvas is heavily weighted in this test based on the results.
I appreciate the site, but what score is considered good or bad? A cool stat would be some kind of score compared to everyone else.
I misread the title as “Cover your taxes” and got really excited to earn about tax avoidance tips. Legal ones obviously.
After disabling extension “I still don’t care about cookies” on Librewolf, I went from 17.48 bits unique fingerprint to 16.48 nearly unique one.
It seems like the characteristics of my Android tablet doom me here - I was unique even using Chrome.
How does tails get the bits so low?
Tails uses the Tor Browser which does a lot to minimize fingerprinting, for example by letterboxing so the screen size (one of the most unique information in my case) is rounded as to not be as unique.
Your browser fingerprint appears to be unique among the 183,996 tested in the past 45 days.
:(
With browser settings that actually let me use the internet in a way that’s not overly cumbersome and annoying, I get 16bits or something and a “nearly unique fingerprint”
Block any and all ads, then it doesn’t matter that they have your data if they can’t make money off of it (they still will do that by creating data aggregates but you can’t control that)
I get 8.44 bits (1 in 347.34 browsers). I use Firefox with Arkenfox user.js applied on top, with some of my own custom overrides.
However, I think the biggest factor could be because I have Ublock Origin set to medium-hard mode (block 1st party scripts, 3rd party scripts and 3rd party iframes by default on all websites), so the lack of JavaScript heavily affects what non-whitelisted websites can track. I did whitelist 1st-party scripts on the main domain for this test (coveryourtracks.eff.org), but all the ‘tracker’ site redirects stay off the whitelist.
I actually had to allow Ublock Origin to temporarily visit the tracker sites for the test to properly finish–otherwise it gives me a big warning that I’m about to visit a domain on the filter list.
Huh mullvad browser got me the lowest overall. 10.44 bits and a non-unique fingerprint.
Compared against:
- Firefox with arkenfox user.js (macOS)
- Tor (macOS and android)
- Vanadium (android)
- Cromite (android)
- Mull (different than mullvad) (android)
I do a vast majority of my browsing on my phone, unfortunately. Vanadium scored the best (on mobile), but it not having extensions (dark reader is a must) and the navigation bar not being movable to the bottom of the screen keeps me on Mull.
I don’t love using mullvad for day to day browsing as I can’t whitelist specific cookies to retain. Don’t love having to re 2fa daily.
16.47 on Cromite. But most of the identify information is not even true, almost everything is spoofed. User agent, timezone, operating system, browser name, screen size and color depth, device, even the battery percentage
Does this spoofing change with every page you visit? If so that’s really neat!
17.47 on mobile Vivaldi.