Fingerprinting isn’t always possible to defeat, and its not always possible to avoid making accounts (work and school accounts)

However, it should be possible to fill up tracked data with meaningless garbage and reduce the signal-to-noise ratio. Ex: a bot that browses random products on amazon to reduce profiling accuracy.

Do you guys know of any tools that do this? Anything from browser extensions to command line scripts, to anonymous group-accounts.

  • @[email protected]
    link
    fedilink
    2
    edit-2
    2 months ago

    Just FYI You would have to be using the same exact browser configuration you normally browse with, otherwise the fingerprint it uses will be different.

    • @[email protected]OP
      link
      fedilink
      12 months ago

      Yeah, cookies, account logins, and other stuff make it hard too. Ex: randomly exploring gmail emails at different times of day, but not actually marking emails as read.

      • @[email protected]
        link
        fedilink
        1
        edit-2
        2 months ago

        Right, even the most secure/private browser cannot help opsec failures… if only one person visits the same website(s) at the same time every day, you are not anonymous. But we all must define our own threat models and apply what’s realistic for us individually.

    • Lemongrab
      link
      fedilink
      1
      edit-2
      2 months ago

      Except for shared unique similarities. Fingerprinting designers know “not all data is good data” and will then filter out bad data and use hard to change charateristics, like hardware or software similarities, which can enable cross-browser fingerprinting.

      • @[email protected]
        link
        fedilink
        12 months ago

        What is a “shared unique similarity”? Sounds a lot like something that isn’t unique to me…