Compare to cookies. I use two extensions. The first accepts all cookies to bypass cookie banners. The second deletes all non white listed cookies on closing the page. This works well for me since I seldom have more than 20 pages open, and I constantly close them.
Is there a way to avoid browser fingerprinting like this at all (with potential qol benefits) or am I extra screwed because I do things like this in addition to running Linux on a computer I built?
Tor Browser is designed to look like every other running Tor Browser on a somewhat-similar screen, if you use it.
Check out Mullvad Browser, which is based on FF. It has always showed up as giving a non-unique fingerprint for me on the EFF site.
Does Mullvad just create random print everytime you get new identity. I think the idea is to just keep switching it
Couple interesting resources:
These mostly just tell you how fucked you are though. The latter has some resources about how to deal with it, but it’s not that useful. The former is really good at breaking down the datapoints that are fucking you.
A lot of this stuff isn’t really something I’d want to remove, too. Like javascript knowing the viewport size or my timezone. Frustrating.
Edit to add: Found this as well which has some good info for configuring Firefox. Some things seem extreme to me, but it’s quite informative. https://avoidthehack.com/firefox-privacy-config
I use LibreWolf which implements pretty tough fingerprint mitigation… but I end up disabling a lot of it because it breaks a lot of sites.
Here is a good article to give you an overview and ideas how to mitigate fingerprinting.
Thank you for sharing this
The sad irony of that site asking me to accept tracking by them and their 214 partners.
I use noscript so I didn’t see this.
That reads like AI slop
You caught my attention. What are the names of those two extensions?
No op, but i use
I still don’t care about cookies
and one of many cookie autodelete extensions
those are the ones