Amidst the glossy marketing for VPN services, it can be tempting to believe that the moment you flick on the VPN connection you can browse the internet with full privacy. Unfortunately this is quite far from the truth, as interacting with internet services like websites leaves a significant fingerprint. In a study by [RTINGS.com] this browser fingerprinting was investigated in detail, showing just how easy it is to uniquely identify a visitor across the 83 laptops used in the study.

As summarized in the related video (also embedded below), the start of the study involved the Am I Unique? website which provides you with an overview of your browser fingerprint. With over 4.5 million fingerprints in their database as of writing, even using Edge on Windows 10 marks you as unique, which is telling.

  • Mwa@thelemmy.club
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    2 hours ago

    For me I like to prevent fingerprinting by:
    Librewolf(private and less intrusive defaults) + noscript (blocking useless JavaScript) + jsshelter (Javascript sanitization) + Ublock Origin(blocking trackers and ads)

  • FE80@lemmy.world
    link
    fedilink
    English
    arrow-up
    13
    arrow-down
    1
    ·
    8 hours ago

    Librewolf + uBlock Origin + Privacy Badger + containerise

    For the comedy extra point, a user agent switcher can actively lie about your browser & OS.

    • blurb@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      5
      ·
      4 hours ago

      uBlock Origin and Privacy Badger shouldn’t be paired together. Containers do nothing to prevent your fingerprint from being collected. LibreWolf itself is easily fingerprintable. And the user agent isn’t the only telltale sign of your browser and OS, changing it will just make you more unique.

      Just use Mullvad Browser with the default settings.

    • w3dd1e@lemmy.zip
      link
      fedilink
      English
      arrow-up
      17
      arrow-down
      1
      ·
      edit-2
      8 hours ago

      Using a browser like Librewolf is, itself a unique identifier bc not enough people are using it.

      EFF has a tool that lets you check your “uniqueness” and bc I used a lesser known browser, it was easier to track me.

      Not that I mean you shouldn’t use it. I just wanted to clarify that it doesn’t make you safe from ads. :(

      • FE80@lemmy.world
        link
        fedilink
        English
        arrow-up
        17
        arrow-down
        1
        ·
        7 hours ago

        https://coveryourtracks.eff.org/ is the EFF tool.

        My results say that I have strong protections against tracking, and that my browser is unique. It’s as good as I can get.

        The agent switcher also tells the world my Librewolf on Linux is Chrome on Windows.

        • w3dd1e@lemmy.zip
          link
          fedilink
          English
          arrow-up
          7
          arrow-down
          1
          ·
          7 hours ago

          Thanks for linking it! I should have done that. And if LibreWolf is showing as Chrome on Windows, then you’re good!

        • w3dd1e@lemmy.zip
          link
          fedilink
          English
          arrow-up
          2
          ·
          7 hours ago

          Thanks for linking it! I should have done that. And if LibreWolf is showing as Chrome on Windows, then you’re good!

    • hodgepodgin@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      1
      ·
      4 hours ago

      This breaks most websites you’ll visit. Just to keep in mind to others considering locking their browser down.

  • Chivera@lemmy.world
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    1
    ·
    13 hours ago

    I bought a used laptop from a yard sale and only use public Wi-Fi and never use the laptop for anything with my name on it.

    • CluckN@lemmy.world
      link
      fedilink
      English
      arrow-up
      29
      ·
      10 hours ago

      Pfft amateur, I break into my local Applbee’s after 2AM and use their POS terminal browser to look at used cars.

      • ByteOnBikes@discuss.online
        link
        fedilink
        English
        arrow-up
        20
        arrow-down
        1
        ·
        9 hours ago

        Applebee’s at 2AM which leaves a physical trail? Noob. I strap meshtastic nodes on wild dogs, using them as a Internet relay at 1-2kb a second, to look at manga leaks.

  • Quazatron@lemmy.world
    link
    fedilink
    English
    arrow-up
    27
    ·
    14 hours ago

    I’m not looking to be anonymous, I want access to Stargate Atlantis that Amazon Prime is geo blocking from me.

    For that, VPN works as advertised.

  • GreenShimada@lemmy.world
    link
    fedilink
    English
    arrow-up
    40
    ·
    16 hours ago

    It’s always kind of funny when the Technology folks wade into well-researched and well-worn Privacy territory.

    Do you want to not wave a giant flag of your activity to Google, Meta, MS, and your ISP when you do literally anything online? Either use a VPN and Mullvad (or Librewolf, but YMMV) browser, OR a VPN and Tor OR Tor with an https bridge if paying for a VPN will make you a target (Tor bridges are not for casuals, save them for those in genuine need).

    VPN locations need to be changed. Frequently. Router level VPN at home becomes your “This is me” location, then make use of VPNs on each device when you want an extra layer of obfuscation.

    There’s not a lot of middle ground at this point, and it’s not difficult.

    • filister@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      6 hours ago

      You also need to change the devices browsers, extensions and timezones to stay anonymous or buy a device and set the most common fingerprint settings, so it is harder for those companies to track you down. It is a slippery slope, and you can check your browser fingerprint and avoid adding unique settings, extensions or anything that can help them to track you.

    • The Velour Fog @lemmy.world
      link
      fedilink
      English
      arrow-up
      8
      ·
      edit-2
      12 hours ago

      Does that mean my ISP can still detect if I’m going to websites they don’t approve of if I’m using Mullvad as my VPN but using Firefox as my browser?

      • A_Random_Idiot@lemmy.world
        link
        fedilink
        English
        arrow-up
        13
        ·
        edit-2
        9 hours ago

        No, with a VPN the only thing your ISP sees is you connecting to a VPN server IP.

        But browser finger printing, on the other hand, can identify you to every website you visit, due to info your browser hands over to every website… Such as OS version, Resolution, installed Plugins, browser settings, geolocation info, etc…which is often unique enough to identify you out of the whole of the internet.

        Ironically, locking your browser down with more security features/settings/plugins often makes you more identifiable. Cause capitalism is god damned sure they are gonna track you and monetize the hell out of your information, whether its via your name, your user name, or just your digital fingerprint.

        https://coveryourtracks.eff.org/

        • LucidNightmare@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          1
          ·
          3 hours ago

          I’m always a little shocked at what my browsing habits prevent from these types of things. Thanks for sharing! I feel a little better about my browsing usage!

      • WolfLink@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        14
        ·
        12 hours ago

        Your ISP can’t tell who you are contacting if you are using a VPN, but websites will track you by other means.

        • The Velour Fog @lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          9 hours ago

          Ok, cool. It was mainly my ISP I was worried about.

          Would be useful for me to find a browser that obfuscated fingerprinting efforts too though.

          • limerod@reddthat.com
            link
            fedilink
            English
            arrow-up
            3
            ·
            8 hours ago

            If you use addons like Ublock-origin. You can reduce the fingerprinting. You can also disable 3rd party iframes, disable Javascript which can further reduce the data being sent to websites.

    • artyom@piefed.social
      link
      fedilink
      English
      arrow-up
      5
      ·
      12 hours ago

      Router level VPN at home becomes your “This is me” location

      You and a thousand other people.

      • magguzu@lemmy.pt
        link
        fedilink
        English
        arrow-up
        10
        ·
        7 hours ago

        Yeah, but fingerprinting is effective by cross referencing.

        There are 1,000 people with the IP 1.2.3.4

        There are 500 people with the IP 1.2.3.4 using Firefox

        There are 25 people with the IP 1.2.3.4 using Firefox with a 1440p screen

        There are 2 people with the IP 1.2.3.4 using Firefox with the dark reader extension with a 1440p screen at 75Hz

        etc.

        So rotating the IP can screw with that.

  • lol_idk@piefed.social
    link
    fedilink
    English
    arrow-up
    50
    ·
    19 hours ago

    If the NSA wants you, they will get you. But I can hide from most of you with just a little email relay and a VPN

  • otacon239@lemmy.world
    link
    fedilink
    English
    arrow-up
    69
    arrow-down
    5
    ·
    20 hours ago

    The only real advantage you gain is being able to watch things outside your region. Without lots of work, you’re pretty easily traceable on the modern internet.

    • Broken@lemmy.ml
      link
      fedilink
      English
      arrow-up
      7
      ·
      8 hours ago

      The other major advantage is your ISP can’t build a profile on you. Considering they know who you are and where you live, that’s a pretty important air gap to me.

    • Lost_My_Mind@lemmy.world
      link
      fedilink
      English
      arrow-up
      23
      ·
      17 hours ago

      I remember in 1996 my neighbor was in one of these fancy new things on the internet called a “chat room”.

      He got into an arguement with someone. It got heated. Until the other guy threatened to show up at my neighbors house.

      My neighbor scoffed and laughed.

      Then the guy put in my neighbors real address. To this day, that still scares me. And back then internet crime wasn’t taken seriously. In fact doxxing back then may not yet have even been a crime.

        • Lost_My_Mind@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 hours ago

          Today, yes. In 1996 “doxxing” wasn’t a term. The internet was so new to people that nobody knew what it could even do.

          I’ll give you a great example. I remember watching a news report fall of 2000, where K*B Toys was trying this untested idea. Could they use the internet to sell things? The experts said no, and that the internet was a fad. It simply wasn’t a medium you could use for commercial things…ebay aside.

          In 1996 Google didn’t even exist yet. I don’t think Amazon was even a bookstore yet. The internet in those days was primitive, and the wild west of the technology realm.

      • eleijeep@piefed.social
        link
        fedilink
        English
        arrow-up
        1
        ·
        7 hours ago

        Those were the days where if you knew someone’s real name and town that they lived, you could just go and get the telephone directory for that area (the library had all of them) and look up their address and phone number. It would have to be quite a big town before you found multiple people with the same name.

    • ronigami@lemmy.world
      link
      fedilink
      English
      arrow-up
      11
      arrow-down
      1
      ·
      edit-2
      15 hours ago

      Most vendors are not going to trace you like that. They can, but it’s actually kind of nontrivial and not “easy.”

      • otacon239@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        9 hours ago

        I’m more thinking about government. I gave up on trying to avoid ad tracking forever ago. But if you think a VPN keeps you safe posting “anonymously”, it doesn’t. That’s more what I’m referring to.

    • GreenShimada@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      5
      ·
      16 hours ago

      Not at all.

      Do anything where you log in under one location with vanilla FF. Do everything else with 2 or more browsers under 20 other locations.

  • Amoxtli@thelemmy.club
    link
    fedilink
    English
    arrow-up
    29
    ·
    20 hours ago

    This is why you use a separate browser for different activities and don’t cross contaminate.

    • ZoteTheMighty@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      1
      ·
      8 hours ago

      That’s the point. It doesn’t matter how many middle layers there are, if you’re using a web browser, there are hundreds of pieces of information that can still be used to uniquely identify you. Do you have WebGL enabled? If so, you could be identified with 100 constantly changing proxies.

    • Cousin Mose@lemmy.hogru.ch
      link
      fedilink
      English
      arrow-up
      4
      ·
      18 hours ago

      I’m here with multi-hop VPN with the first two hops staying in-country and the rest all random + a shit load of DNS blocking lists and browser extensions + blocking Google. I use different VPN providers too. I’m also introducing variable delays to my traffic to make NetFilter data less helpful.

      • hietsu@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        8
        ·
        14 hours ago

        Hops don’t matter at all against fingerprinting, which includes things like fonts you have installed, the os, os version number, browser version, extensions, some browser settings/flags, timezone, keyboard layout, your screen resolution, dpi, and what ever the crap the ”canvas” has stored. So pretty much no matter what you do, you’re unique.

        You can use some browsers that resist fingerprinting but guess what, those are so rarely used that again you shine like a beacon. I’m still yet to find an browser extension that would fake all my fingerprint parameters by setting them as what is the most common one in each category. So a Windows user running latest Chrome full screen on Fullhd monitor.

        And there is nothing stopping websites running the fingerprinting services and scripts on their own server, albeit most rely on third parties for convenience, and these at least can be blocked.

      • GreenShimada@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        ·
        16 hours ago

        Please understand that browser extensions make you more easy to track. I used to be under the same assumption, but uBO is as far as you should go. fingerprints include your extensions.

        • artyom@piefed.social
          link
          fedilink
          English
          arrow-up
          3
          ·
          11 hours ago

          That depends on whether your browser exposes them, and if/how they affect your fingerprint. If you go to deviceinfo.me it will show you what your browser is exposing.

        • Cousin Mose@lemmy.hogru.ch
          link
          fedilink
          English
          arrow-up
          4
          ·
          16 hours ago

          My thinking is that most of the fingerprinting is happening by third parties, and where it’s the website operators themselves I’m not super concerned about being fingerprinted.

  • BaroqueInMind@piefed.social
    link
    fedilink
    English
    arrow-up
    9
    ·
    edit-2
    18 hours ago

    Until someone invents real-life Intrusion Countermeasure Electronics from the cyberpunk genre, where doing shit you dont like leads them to have their equipment destroyed with electricity surge, nothing you do online is private nor is there any consequences from them enumerating everything about you to sell or use maliciously.

    • dangling_cat@piefed.blahaj.zone
      link
      fedilink
      English
      arrow-up
      28
      ·
      edit-2
      19 hours ago

      Part of the reason Tor is good is because it generates the same fingerprint for all users (part of the reason you shouldn’t install additional extensions on it, by the way). Mullvad browser tries to do this but without the Tor network.

      • bluesheep@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        14 hours ago

        How would tor do that? As far as I understand the fingerprint is an aggregate of multiple very specific variables ie https://amiunique.org/fingerprint. Sure tor might set some (or a lot) to a default but some are very difficult to circumvent such as the rendering of specific shapes and text.

    • cmnybo@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      26
      ·
      20 hours ago

      You can’t hide or get rid of the browser fingerprint, but some addons can help to randomize it so it looks like you’re using a different device every time you visit a site.

      • Em Adespoton@lemmy.ca
        link
        fedilink
        English
        arrow-up
        12
        ·
        19 hours ago

        Personally, I don’t care if a site can fingerprint me. As long as they can’t tie that fingerprint to a rich data set.

        So I make sure that each domain gets a different fingerprint response. That means that a site can validate that I’m still the same user, but any XSS attempting fingerprint based data exchange just gets garbage.

        • tb_@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          ·
          16 hours ago

          And how do you go about that? Do you adjust your window size and extensions on a site-by-site basis?

    • GreenShimada@lemmy.world
      link
      fedilink
      English
      arrow-up
      8
      ·
      16 hours ago

      Some, but only if you’re using a very common device (i.e. Dell Latitude) with Windows. Browser fingerprinting gives up hardware specs, so hiding by blending in only works when your hardware is hard to pin down.

      Use a browser that hides hardware specs, like Mullvad or Libreworlf. Even Brave is ok.