I’ve just been playing around with https://browserleaks.com/fonts . It seems no web browser provides adequate protection for this method of fingerprinting – in both brave and librewolf the tool detects rather unique fonts that I have installed on my system, such as “IBM Plex” and “UD Digi Kyokasho” – almost certainly a unique fingerprint. Tor browser does slightly better as it does not divulge these “weird” fonts. However, it still reveals that the google Noto fonts are installed, which is by far not universal – on a different machine, where no Noto fonts are installed, the tool does not report them.

For extra context: I’ve tested under Linux with native tor browser and flatpak’d Brave and Librewolf.

What can we do to protect ourselves from this method of fingerprinting? And why are all of these privacy-focused browsers vulnerable to it? Is work being done to mitigate this?

  • @[email protected]
    link
    fedilink
    English
    24 months ago

    OK, my fingerprint for Tor Browser is 0b8c195e60af3e2c29ebb8adecb340b1. Is it so unique? What is yours?

    • lemmyreader
      link
      fedilink
      English
      24 months ago

      I guess the important thing is in the unique versus total in for example 200 fonts and 150 unique metrics found.

      • @[email protected]
        link
        fedilink
        English
        24 months ago

        It doesn’t matter really, one can write any words on a webpage, but show me the proof e.g. an unique and permanent resulting fingerprint.

        I see from topics like this that many people don’t understand fingerprinting, just showing a fingerprint, a soft of ID means nothing. A fingerprint must be:

        1. Unique for a particular browser instance, or at least effectively rare. For example, when the same browser on different distros shows different fingerprints.
        2. Permanent, the same each time you launch the browser.