It was at the Securedrop website. How did I end up there ? I read something about Sequoia and encryption and then wanted to see what Securedrop entailed.

Meanwhile I’ve raised the security settings. Still, today someone in this community (?) mentioned that Tor browser does not protect the remote to check for the OS, and now this. Color me surprised.

  • refalo@programming.dev
    link
    fedilink
    arrow-up
    2
    ·
    2 months ago

    I wasn’t trying to debate how the uniqueness is calculated, you’re absolutely right on that, and other sites like creepjs do the same, but I think where the eff site is a tad misleading is in how it presents their “just how unique AM I” part of the results, because they only have their own collected data to compare that against.

    Sadly I think even disabling JS entirely would take away so much “blending in” that it still wouldn’t be hard to uniquely fingerprint a user without it. Even CSS (without JS) and standard HTML tags like “picture” can be used to fingerprint now.

    • lemmyreader@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      Sadly I think even disabling JS entirely would take away so much “blending in” that it still wouldn’t be hard to uniquely fingerprint a user without it. Even CSS (without JS) and standard HTML tags like “picture” can be used to fingerprint now.

      Right. I guess there’s also a difference between wanting to be as anonymous as possible and wanting to not be tracked too much by some sites.

      In some browser profiles I do block JS completely for a few reasons.

      • Let’s me read a lot of articles. Even articles with supposedly “paywalls”.
      • Clutter free reading. Does it matter that the remote sites can recognize me based on a unique FP and build a profile ? I’m not too bothered. Should I ?

      For other use cases I prefer Tor browser without any added extensions.