Amidst the glossy marketing for VPN services, it can be tempting to believe that the moment you flick on the VPN connection you can browse the internet with full privacy. Unfortunately this is quite far from the truth, as interacting with internet services like websites leaves a significant fingerprint. In a study by [RTINGS.com] this browser fingerprinting was investigated in detail, showing just how easy it is to uniquely identify a visitor across the 83 laptops used in the study.

As summarized in the related video (also embedded below), the start of the study involved the Am I Unique? website which provides you with an overview of your browser fingerprint. With over 4.5 million fingerprints in their database as of writing, even using Edge on Windows 10 marks you as unique, which is telling.

  • Cousin Mose@lemmy.hogru.ch
    link
    fedilink
    English
    arrow-up
    4
    ·
    18 hours ago

    I’m here with multi-hop VPN with the first two hops staying in-country and the rest all random + a shit load of DNS blocking lists and browser extensions + blocking Google. I use different VPN providers too. I’m also introducing variable delays to my traffic to make NetFilter data less helpful.

    • hietsu@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      8
      ·
      14 hours ago

      Hops don’t matter at all against fingerprinting, which includes things like fonts you have installed, the os, os version number, browser version, extensions, some browser settings/flags, timezone, keyboard layout, your screen resolution, dpi, and what ever the crap the ”canvas” has stored. So pretty much no matter what you do, you’re unique.

      You can use some browsers that resist fingerprinting but guess what, those are so rarely used that again you shine like a beacon. I’m still yet to find an browser extension that would fake all my fingerprint parameters by setting them as what is the most common one in each category. So a Windows user running latest Chrome full screen on Fullhd monitor.

      And there is nothing stopping websites running the fingerprinting services and scripts on their own server, albeit most rely on third parties for convenience, and these at least can be blocked.

    • GreenShimada@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      16 hours ago

      Please understand that browser extensions make you more easy to track. I used to be under the same assumption, but uBO is as far as you should go. fingerprints include your extensions.

      • artyom@piefed.social
        link
        fedilink
        English
        arrow-up
        3
        ·
        12 hours ago

        That depends on whether your browser exposes them, and if/how they affect your fingerprint. If you go to deviceinfo.me it will show you what your browser is exposing.

      • Cousin Mose@lemmy.hogru.ch
        link
        fedilink
        English
        arrow-up
        4
        ·
        16 hours ago

        My thinking is that most of the fingerprinting is happening by third parties, and where it’s the website operators themselves I’m not super concerned about being fingerprinted.