this post was submitted on 14 Aug 2024
217 points (97.0% liked)

Firefox

17938 readers
3 users here now

A place to discuss the news and latest developments on the open-source browser Firefox

founded 4 years ago
MODERATORS
 

I really enjoy Firefox on Android as I can install a bunch of extensions and I find those extensions game changer, especially on the mobile.

One of my favorites are

  • Libredirect - literally one of my favorite ones. Redirects popular sites to privacy focused frontends, like YouTube to Invidious, etc.
  • uBlock Origin - I guess everyone knows this one
  • Privacy Badger - blocks trackers
  • Ghostery - blocks trackers, ads, scripts, etc.

What extensions do you guys use?

you are viewing a single comment's thread
view the rest of the comments
[–] delirious_owl@discuss.online 3 points 3 months ago (3 children)

Chameleon. My user agent changes every 30 seconds. Makes attempts to track me basically useless.

[–] EvenOdds@lemm.ee 4 points 3 months ago (1 children)

Changing your user agent will not stop you being tracked. Browser fingerprinting can work with heaps of different signals, and is very difficult to block.

[–] delirious_owl@discuss.online -2 points 3 months ago* (last edited 3 months ago) (1 children)

It means I'm being tracked for 30 seconds. So basically useless tracking.

Chameleon doesn't just change the user agent. It changes a bunch of stuff that's used to break fingerprinting. Of course you have a fingerprint, but it constantly changes so that the data they collect is so short lived that its useless to them and therefore very useful to me.

[–] pathief@lemmy.world 2 points 3 months ago* (last edited 3 months ago) (1 children)

You can try to fool it with a VPN, change country, etc but it doesn't work. Fingerprinting is very strong these days.

[–] delirious_owl@discuss.online 0 points 3 months ago (2 children)

That website is marketing bullshit. It doesn't tell you if you fingerprint "ID" is unique. If can just spit out the same fingerprint for millions of users, and it looks impressive but its totally worthless as a fingerprint.

Try again with some service that isn't trying to sell you their product

[–] Album@lemmy.ca 2 points 3 months ago* (last edited 3 months ago) (1 children)

https://abrahamjuliot.github.io/creepjs/index.html

Your extension might make you MORE finger-printable. Advanced fingerprinting scripts can detect lies told by extensions.

https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting

If you're actually interested in reducing your fingerprint you should read the arkenfox guide which leverages built in features from firefox. You'll see very quickly that if someone wants to fingerprint you it's trivial and there's little you can do short of TOR.

more reading: https://www.privacyguides.org/en/desktop-browsers/?h=fingerprint#anti-fingerprinting

[–] delirious_owl@discuss.online 1 points 2 months ago (1 children)

Again, they can fingerprint me. Buy their fingerprint is useless because it constantly changes.

[–] Album@lemmy.ca 2 points 2 months ago (1 children)

You misunderstand. They're calculating a fingerprint that identifies you across sessions despite you changing up a bunch of values on your browser with an extension because that's all highly detectable. They know it's junk data they don't use it. It actually is worse because you stop blending in with the crowd.

You're better off blending in then trying to look unique with every visit. The latter is a flawed concept.

Read the arkenfox guide they get into it. Most extensions just reduce your ability to blend in to the crowd and thus should be avoided.

[–] delirious_owl@discuss.online 1 points 2 months ago

They don't. I'm telling you they don't. When I disable my ad blocker, the ads I see are not relevant to me. Many times they're not even in a language that I can speak.

They are not tracking me between sessions. Its obvious.

What you're saying makes sense, and its why Tor does what it does. But in practice, this works too.

[–] pathief@lemmy.world 1 points 3 months ago* (last edited 3 months ago)

If you try with a Tor browser you'll get a unique ID everytime.

Feel free to try this one instead: https://www.amiunique.org/fingerprint

Or whatever website you prefer, really. Fingerprinting is not solved by a single extension or checkbox. It's really hard.

[–] treasure@feddit.org 2 points 3 months ago (1 children)

Are you passing CloudFlare captchas with that? I'm using a VPN and whenever I hit a CloudFlare captcha with a modified user agent, it doesn't let me pass.

[–] delirious_owl@discuss.online 2 points 3 months ago

Sometimes. It depends if the admin misconfigured their cloudflare.

I dont have issues logging into cloudflare's website itself with this setup. I have had to email many website admins to let them know that they have a broken cloudflare config.

[–] JackbyDev@programming.dev 1 points 3 months ago (1 children)

Doesn't that fuck up logins and stuff?

[–] delirious_owl@discuss.online 1 points 3 months ago* (last edited 3 months ago) (1 children)
[–] JackbyDev@programming.dev 1 points 3 months ago (1 children)

I would imagine many services would think you're hijacking the session or something.

[–] delirious_owl@discuss.online 0 points 3 months ago* (last edited 3 months ago)

No, that would he a very dumb system. Because it would false positive every time someone changed their user agent, which is a common defense tactic in today's threat landscape.

You don't want to ban someone for protecting themselves. But I'm sure there are dumb execs who have thought this was a good idea until someone on the sec team slapped them and said "no"