Came across this article and it got me thinking, are there any simple ways to defeat advanced tracking methods (fingerprinting, tracking pixels, etc.)?
Obviously you could go the Tor on a virtual machine route, or a non persistent set up like TAILS, but what about a browser that’s able to give say, a 80% solution?
I work in the security industry and am always looking for the solution that is simple enough that its palatable to a client (not asking to change your whole lifestyle, just push this button) but also relatively effective.
Yea, this is a great and healthy skepticism to have. It’s why I went deep on this little research tangent.
Besides browser fingerprinting, there are many other ways to tie you to online behavior. For instance, the DAITA thing has nothing to do with browser fingerprints, but specifically the size of your inbound and outbound traffic. The NSA uses that to figure out your behavior and link on-VPN and off-VPN traffic together with great success, regardless of how many hops you go through. It’s the behavior that gives you away.
I’m always on my VPN, reconnect at random times, and have all the extras turned on. Something else that may be a factor is that I have Mullvad Browser installed via Flatpak and is sandboxed to hell. Maybe you installed via .deb or something in Mint?
Any way, thanks again for humoring me in this! I think you’re right that at least you are sorta getting lumped in with others, but it’s never going to be 100% foolproof and we should all plan for that.
I got so paranoid about librewolfs unique fingerprint that I threw it away and started using mullvad browser 😅 I use the one you can manually download from mullvad website, as mint doesn’t support mullvad repository. I just now tried the flatpak one and it was showing 600+ visits…but it’s unverified, so idk if that’s something to worry about?
I use basic firefox for stuff where I need to log in as me. probably won’t prevent some goddamn AI from spying on me but at least I feel one bit safer 🤡