• Optional@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    4 days ago

    Mullvad has a fork of Firefox they built with TOR (the organization, it does not route over TOR network). Includes NoScript and ublock origin and works by making all browsers the same ( so long as you don’t fsck with it).

    You don’t have to use it with their VPN but that’s good, too.

    My only complaint is it doesn’t support containers. Otherwise it’s wonderful.

    https://mullvad.net/en/browser

  • Boddhisatva@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    4 days ago

    Really bad headline. The actual article is about a study showing that browser fingerprinting is being used in real time in pricing target ads to your browser.

    To investigate whether websites are using fingerprinting data to track people, the researchers had to go beyond simply scanning websites for the presence of fingerprinting code. They developed a measurement framework called FPTrace, which assesses fingerprinting-based user tracking by analyzing how ad systems respond to changes in browser fingerprints. This approach is based on the insight that if browser fingerprinting influences tracking, altering fingerprints should affect advertiser bidding — where ad space is sold in real time based on the profile of the person viewing the website — and HTTP records — records of communication between a server and a browser.

    “This kind of analysis lets us go beyond the surface,” said co-author Jimmy Dani, Saxena’s doctoral student. “We were able to detect not just the presence of fingerprinting, but whether it was being used to identify and target users — which is much harder to prove.”

    The researchers found that tracking occurred even when users cleared or deleted cookies. The results showed notable differences in bid values and a decrease in HTTP records and syncing events when fingerprints were changed, suggesting an impact on targeting and tracking.

    Additionally, some of these sites linked fingerprinting behavior to backend bidding processes — meaning fingerprint-based profiles were being used in real time, likely to tailor responses to users or pass along identifiers to third parties.

    • benignintervention@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 days ago

      I have never been able to figure out how to block fingerprinting without entirely disabling my browser and it looks like the race to the bottom is accelerating

  • rottingleaf@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    arrow-down
    1
    ·
    4 days ago

    Things which were obvious for any paranoid I2P user 15 years ago, and were being discussed in Freenet 20 years ago, and by cypherpunks 30 years ago, are again new and unexpected.

    See, you can murder people in the open if you can make it comfortable enough for everyone to ignore it.

    Surveillance and censorship should be scarier, because without them you can cry out about the murderer or avoid strategic disadvantage against the murderer, but are not - most people haven’t been in real danger they understood. And even if they were - suppose that’s already happening, people are being murdered in the open, censorship and surveillance happen, and the latter causes more outrage, - we all can see nobody cares enough to pay with a few bruises for opposing it, not just their living, health, life.

    Here we are.