I went on amiunique.com, and it says that I’m unique.

Lowest scores: list of fonts JS (0.01%), canvas (0.00%), media devices (0.00%), user agent (0.11%), and audio data (0.80%)

I use Linux Mint Debian edition, Librewolf browser, and Mullvad VPN. How do I become less unique?

  • gid@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    7 days ago

    A big part of the anonymisation of Tor is from the routing, so I’m doubtful that just using their Firefox customizations would be enough.

    • moseschrute@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      18 hours ago

      That’s not what I was talking about. The Tor network (onion routing) is a totally separate thing. Tor as an application has very good anti fingerprint protections. I was referring to that feature specifically not the rest of Tor.

      Sure if you really wanna benefit, use Tor’s routing. But I am just admiring that the people that built Tor really knew what they were doing in all aspects of the application including the anti fingerprint protections.

      • gid@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        12 hours ago

        Right, I understand.

        There are browsers that implement a lot of Tor Browser’s anti-fingerprinting features, such as LibreWolf.

        The problem is that if you’re connecting to a site from an unique IP address then you’re still uniquely identifiable regardless of how much your browser resists fingerprinting measures. If you have a dynamic IP address, information can still be derived from this to build an approximate profile for you (location, language, possible interests, statistically likely demographic bands etc.). It’s surprising how accurate these can get.

        The strength of the anti-fingerprinting features in Tor browser is really an additional protection on top of the main anonymisation feature: the routing. Everyone using the Tor browser and routing appears (kind of) the same to a site.

        Connecting through a VPN provider is a half-way measure, but still won’t be as good as Tor. To a site or tracker you’ll appear as one of a smaller set of people connecting from that VPN where your browser fingerprint is different from others in the pool of people connecting via that VPN. That may not be enough to personally identify you, but it’s enough to build a fairly well-targeted profile of you.

        So tl;dr: anti-fingerprinting browser features are really cool and technically clever, but they don’t protect against all the ways you can be profiled. And somewhat counter-intuitively, using only browser-level de-anonymisation features could actually make you appear more unique to sites or trackers, because you’ll be one of relatively few people with that combination of browser and network connection profile.