Search Support

Beware of phishing attacks: Mozilla will never ask you to call a number or visit a non-Mozilla website. Please ignore such requests.

Learn More

Fingerprinting protection doesn't work in FF67, try https://amiunique.org

  • 4 replies
  • 1 has this problem
  • 29 views
  • Last reply by rouelle

more options

Firefox 67 is suppose to block fingerprinting when activated in the security/privacy settings. Well, try this french site : https://amiunique.org and see what can be read from your system and browser. I'm wondering how can it be possible to block fingerprinting other than giving false/random/generic data and be like everyone, not unique...

Chosen solution

It depends on what is giving you away as "unique". In the details for "My fingerprint" you can identify what gives you a low "Similarity ratio" and then obfuscate those variables. These may have side-effects. For example, both my content language and my timezone have a SR < 0.1% — I could change these, but these may have undesirable side-effects I'm not prepared to tolerate.

Read this answer in context 👍 0

All Replies (4)

more options

Chosen Solution

It depends on what is giving you away as "unique". In the details for "My fingerprint" you can identify what gives you a low "Similarity ratio" and then obfuscate those variables. These may have side-effects. For example, both my content language and my timezone have a SR < 0.1% — I could change these, but these may have undesirable side-effects I'm not prepared to tolerate.

more options

That's what I thought, you can't avoid fingerprinting :-( without side-effects. How then does the fingerprint protection work in FF67? Mozilla shouldn't give users a false sense of protection if the efficiency is too low...

more options

According to [this post] the fingerprinting protection looks to be based on a server blacklist rather than analysing server behaviour:

"How will Firefox block these harmful scripts?

To combat these threats, we are pleased to announce new protections against fingerprinters and cryptominers. In collaboration with Disconnect, we have compiled lists of domains that serve fingerprinting and cryptomining scripts…"

(I must admit, I'm surprised at this, I thought it was based on server behaviour too.)

Modified by oneofthedamons

more options
[...] the fingerprinting protection looks to be based on a server blacklist rather than analysing server behaviour[...]

Ah, I see... It's indeed a good start and it answers my question. But Mozilla should warn it's users that the protection is partial.

This post should be marked with SOLVED.

Thank you!