(02-09-2025, 10:18 PM)antipelican Wrote: I am curious about browser fingerprinting. There are lots of websites that will give you reports on how easily identifiable your browser is, but beyond the basic changing certain setting in Firefox, I'm coming up short on how to make sure that my fingerprint is less identifiable . Running the tests on coveryourtracks.eff.org and browserleaks.com just gives me info about what might be identifiable, but not how to fix it.What you're doing sounds pretty reasonable already.
For reference, I use a paid VPN and generally use Firefox with setting changed to (theoretically) make me less identifiable. I will sometimes use Tor. I never access the web without at least the VPN, change what servers I connect to frequently, and have a killswitch so that hopefully an error doesn't cause my location to leak, but it's hard to understand how difficult this actually makes me to track considering fingerprinting seems to pull data not connected to VPN status but rather my hardware settings.
One thing you might try is this addon: https://addons.mozilla.org/en-US/firefox...ontainers/
You can just spin up a new "account" constantly and it'll have fresh data and fingerprinting will be far less effective.
Be sure you've turned on Resist Fingerprinting: https://support.mozilla.org/en-US/kb/res...erprinting
This randomizes a number of settings that are used for fingerprints.
the horrors persist, but so do we
(aka large mozz)
(aka large mozz)