this post was submitted on 07 Dec 2024
37 points (97.4% liked)
privacy
3365 readers
30 users here now
Big tech and governments are monitoring and recording your eating activities. c/Privacy provides tips and tricks to protect your privacy against global surveillance.
Partners:
- community.nicfab.it/c/privacy
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Check your exposure and how to limit it:
https://coveryourtracks.eff.org/
https://browserleaks.com/
https://amiunique.org/
https://canvasblocker.kkapsner.de/test/test.html
And more at:
https://librewolf.net/docs/testing/
Not all browsers are the same.
Correction:
https://coveryourtracks.eff.org/
Some test sites are definitely not for the uninitiated.
Browserleaks is the least complicated advanced ones so I'll go with that.
Browserleaks has a little thing at the bottom of each one where you can read more about what the tests are.
Basically, the idea for some of them is to be able to hide(spoof) the information about your device, your software, and anything else that might make you stick out from others.
IP is straightforward. But your connection can be fingerprinted based on some criteria. Not a major issue unless you're using something weird.
Webrtc can leak your IP even behind a VPN/proxy, along with your hardware specifics.
Webgl can expose your graphics hardware, vendor, and other metrics.
Webrtc and Webgl, I have disabled on everything.
Canvas is how your display/graphics computes. It can have very small variances even in the same GPU on different devices, and when rendering can create uniquely identifying characteristics.
The java script test just shows what java script can sea, some of which can be spoofed using settings or addons. Or by disabling JavaScript.
I use fingerprint resistance in Firefox, and canvas blocker add-on on mobile to reduce uniquely identifying information.
And always ublock origin.
Mull has all the privacy settings enabled and added by default.