-
Notifications
You must be signed in to change notification settings - Fork 3.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Leverage Firefox's upcoming All-in-One Fingerprint resistance #2381
Comments
Does this include Canvas Fingerprinting too ? Also I suppose this is limited to Firefox only ? |
I've been subscribed to this bug since a while to see how it evolves and see if I can make use of the feature in uBO. |
@uBlock-user Yes, with a low-priority. Related: arkenfox/user.js#7 |
I am assuming the setting will be available through the |
There is no All-in-one solution to browser fingerprinting. uBlock can be used as a blocker for fingerprinting hosts or scripts for which there are some filter lists available. The bug discussed in this topic (bug 1308340) is about enabling the in-build browser fingerprinting countermeasures through a privacy setting option. The comment by Simon provides a valuable information regarding the browser fingerprinting : https://bugzilla.mozilla.org/show_bug.cgi?id=1308340#c20
Yes, as observed in comment by Kris, https://bugzilla.mozilla.org/show_bug.cgi?id=1279371#c6
|
its kind of a srtetch calling something a countermeasure when the browser actively included the methods in question and knew about its misuse for over a decade. but at least finally something is being done about it. there is currently no way to browse comfortably(without losing all cookies&history) and with the smallest possible fingerprint. and even if you modify the TorBrowser to be be an every day solution by switching on saved passwords, history and cookies(managed with an addon) and install ublock you still have many more safety measures than a default firefox but its worth nothing because you are already unique because of your unique modifications. this could only be stoped if there was a comfortable option that many use of active spoofing by sending different plausible looking information on each request. |
Maybe it's off-topic, but various discussions like this do not mention a simple solution: use more than one browser. Usually internet users deal with two kinds of browsing, a casual one that includes various searches and clicks on RSS feeds and a personal one where the users logs into a site or forum with it's own nickname. Different browsers for different purposes render this problem easy, IMHO |
but some people have dozens of identities and it becomes impractical to have everything spread over multiple browsers or profiles. |
I always use the same browser to log into some site. If I'm on an hardened browser, I use an addon as Open with to start the other browser that I use to log into sites. |
I prefer to decline for now, it turns out enabling |
Describe the issue
Hello Raymond. You made it clear recently (#2378, #1647) that you don't want to go down the rabbit hole of implementing fingerprint protection because it's a wide and deep endeavor that warrants its own add-on.
I understand. How about one all-encompassing option that puts the burden of implementing fingerprint resistance on the browser? As part of the Tor Uplift project, Firefox devs intend to implement a single config that tells the browser to resist fingerprinting.
The devs will strengthen the effect of this setting over time, a bit like Private Browsing mode. In fact there is discussion on bugzilla about possibly enabling this by default when in Private Browsing mode (same as Tracking Protection). Initially, the discussed effects are:
This alleviates your concern (no need to continually update uBO to block new fingerprinting vectors) while still providing ever-improving protection to users.
The text was updated successfully, but these errors were encountered: