This is an EFF project that allows you to understand how easy it is to identify and track your browser based on how it appears to websites. Anonymous data will be collected through this site.

  • @aufOP
    link
    126 months ago

    Here’s my result (Tested on Safari on iPad)

    • @deranger@lemmy.world
      link
      fedilink
      10
      edit-2
      6 months ago

      You should post the # of bits of identifying info it was able to derive. Best I’m able to do is 15 bits or so. Never seen it below 14, meaning you’re able to be nearly uniquely fingerprinted everywhere.

      • @aufOP
        link
        76 months ago

        Your Results Within our dataset of several hundred thousand visitors tested in the past 45 days, only one in 94902.5 browsers have the same fingerprint as yours. Currently, we estimate that your browser has a fingerprint that conveys 16.53 bits of identifying information.

        It seems that my Safari does not have very strong tracking protection.

        • @mateomaui@reddthat.com
          link
          fedilink
          English
          -26 months ago

          Nvm, I got the same result you did with Firefox and Safari, I realized I was testing on my wifi with a pihole… switched to mobile network only and protection dropped to partial.

        • @mateomaui@reddthat.com
          link
          fedilink
          English
          -4
          edit-2
          6 months ago

          Do you need to turn an option on or off in Safari? I got a strong protection result, same as for Firefox.

      • @alt
        link
        16 months ago

        deleted by creator

      • LostXOR
        link
        fedilink
        3
        edit-2
        6 months ago

        Huh, it says I’m leaking DNS servers and WebRTC IPs, but I don’t have secure DNS enabled, and I’m not really sure why WebRTC leaking my IP is a problem considering I’m already “leaking” my IP just by visiting a website.

        • @mateomaui@reddthat.com
          link
          fedilink
          English
          -3
          edit-2
          6 months ago

          In my case I had reset a device and didn’t disable IPv6. Once I fixed that the bottom two tests still say I’m “leaking”, but all three show only one IP each, for my VPN’s servers (maybe different IPs, but one for each.)

          If I were actually leaking, IPs shown would be for a local DNS, or my residence, etc.