X
點擊此處開啟此網站的行動版。

技術支援討論區

Fingerprinting protection doesn't work in FF67, try https://amiunique.org

已張貼

Firefox 67 is suppose to block fingerprinting when activated in the security/privacy settings. Well, try this french site : https://amiunique.org and see what can be read from your system and browser. I'm wondering how can it be possible to block fingerprinting other than giving false/random/generic data and be like everyone, not unique...

Firefox 67 is suppose to block fingerprinting when activated in the security/privacy settings. Well, try this french site : https://amiunique.org and see what can be read from your system and browser. I'm wondering how can it be possible to block fingerprinting other than giving false/random/generic data and be like everyone, not unique...

被選擇的解決方法

It depends on what is giving you away as "unique". In the details for "My fingerprint" you can identify what gives you a low "Similarity ratio" and then obfuscate those variables. These may have side-effects. For example, both my content language and my timezone have a SR < 0.1% — I could change these, but these may have undesirable side-effects I'm not prepared to tolerate.

從原來的回覆中察看解決方案 0
引用

額外的系統細節

已安裝的外掛程式

  • Shockwave Flash 32.0 r0

應用程式

  • User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:67.0) Gecko/20100101 Firefox/67.0

更多資訊

oneofthedamons 2 個解決方法 10 個答案

選擇的解決方法

It depends on what is giving you away as "unique". In the details for "My fingerprint" you can identify what gives you a low "Similarity ratio" and then obfuscate those variables. These may have side-effects. For example, both my content language and my timezone have a SR < 0.1% — I could change these, but these may have undesirable side-effects I'm not prepared to tolerate.

It depends on what is giving you away as "unique". In the details for "My fingerprint" you can identify what gives you a low "Similarity ratio" and then obfuscate those variables. These may have side-effects. For example, both my content language and my timezone have a SR < 0.1% — I could change these, but these may have undesirable side-effects I'm not prepared to tolerate.
這篇文章有幫助嗎?
引用

提出問題者

That's what I thought, you can't avoid fingerprinting :-( without side-effects. How then does the fingerprint protection work in FF67? Mozilla shouldn't give users a false sense of protection if the efficiency is too low...

That's what I thought, you can't avoid fingerprinting :-( without side-effects. How then does the fingerprint protection work in FF67? Mozilla shouldn't give users a false sense of protection if the efficiency is too low...
這篇文章有幫助嗎?
引用
oneofthedamons 2 個解決方法 10 個答案

According to [this post] the fingerprinting protection looks to be based on a server blacklist rather than analysing server behaviour:

"How will Firefox block these harmful scripts?

To combat these threats, we are pleased to announce new protections against fingerprinters and cryptominers. In collaboration with Disconnect, we have compiled lists of domains that serve fingerprinting and cryptomining scripts…"

(I must admit, I'm surprised at this, I thought it was based on server behaviour too.)

According to [[https://blog.mozilla.org/futurereleases/2019/04/09/protections-against-fingerprinting-and-cryptocurrency-mining-available-in-firefox-nightly-and-beta/ this post]] the fingerprinting protection looks to be based on a server blacklist rather than analysing server behaviour: "'''How will Firefox block these harmful scripts?''' To combat these threats, we are pleased to announce new protections against fingerprinters and cryptominers. In collaboration with Disconnect, we have compiled lists of domains that serve fingerprinting and cryptomining scripts…" (I must admit, I'm surprised at this, I thought it was based on server behaviour too.)

由 oneofthedamons 於 修改

這篇文章有幫助嗎?
引用

提出問題者

[...] the fingerprinting protection looks to be based on a server blacklist rather than analysing server behaviour[...]

Ah, I see... It's indeed a good start and it answers my question. But Mozilla should warn it's users that the protection is partial.

This post should be marked with SOLVED.

Thank you!

<blockquote>[...] the fingerprinting protection looks to be based on a server blacklist rather than analysing server behaviour[...] </blockquote> Ah, I see... It's indeed a good start and it answers my question. But Mozilla should warn it's users that the protection is partial. This post should be marked with SOLVED. Thank you!
這篇文章有幫助嗎?
引用
問個問題

如果您還沒有帳號,您必須先 登入您的帳號 來回覆文章。請 開始一個新問題