357
submitted 17 hours ago* (last edited 17 hours ago) by streetfestival@lemmy.ca to c/privacy@lemmy.ca

This is about cookie banners on websites

There was another time I got into a very serious ontological discussion with a fairly senior engineer about what the difference was between taxes and fines and they didn’t understand there was a difference,” he said.

you are viewing a single comment's thread
view the rest of the comments
[-] No1@aussie.zone 12 points 14 hours ago* (last edited 14 hours ago)

I run all my stuff in a private tab nowadays. And nuke all cookies etc each session.

Also, make sure I have anti-fingerprinting enabled.

With a VPN.

The only annoying thing is I get a few texts/emails saying "A new device just accessed your account. Was it you?". Yes, yes it was. And I'm not relying on a cookie or fingerprinting for security.

[-] masterofn001@lemmy.ca 8 points 10 hours ago* (last edited 10 hours ago)

One of the most overlooked, underused, and still hasn't seen production release privacy settings is the ability to partition, or not decorate visited links.

In Firefox based in about:config


layout.css.visited_links_enabled    

false

In chromium based in chrome://flags

Partition the Visited Link Database, including 'self-links'

Enabled
[-] FEIN@lemmy.world 5 points 9 hours ago

so search engines like google can't see what sites you've visited anymore. genius, never occurred to me that they could track that. thanks for the tip

[-] Auli@lemmy.ca 1 points 16 minutes ago

They can track very well with that.

[-] motogo@feddit.dk 1 points 6 hours ago

Stitching is the concept of updating your profile by appending your interactions from private sessions when you approve that "Yes, it was you" accessing your account "from a new device", or when it's otherwise possible to associate your current session with previous ones in any way.

[-] wonderingwanderer@sopuli.xyz 16 points 13 hours ago

Private tabs do nothing for the backend, your ISP, browser, search engine, and any sites you visit, can still see everything you do. All private tabs do is they don't save history or cookies on your frontend.

VPN hides your data from your ISP, but there are still workarounds. Multi-hop can make you harder to triangulate though.

You still need to use a privacy-centric browser and search engine or else the ones you use can still send information about you back to their servers where they can build a profile on you. They won't have your real IP address as long as you never connect without a VPN, but any little data they collect on you can be collated with the rest to profile you and potentially identify you.

Even with browsers like firefox or waterfox, you still need to enable all of the security settings or else there are gaps that can be exploited. HTTPS-only mode, DNS over HTTPS, anti-tracking extensions, etc...

Even then, I wouldn't be surprised if there's an unseen gap somewhere. But it's a lot better than using google and microsoft and no vpn.

[-] Auli@lemmy.ca 1 points 15 minutes ago

Vpns are over rated.

[-] testaccount789@sh.itjust.works 8 points 12 hours ago

Also, browsers still send so much unique data that they can be reasonably well fingerprinted. I don't really know all the things, but you can combine info such as OS, browser version, window size, list of extensions, HTTP request headers, timezone, etc...
Plus you could also track behavior.
And even with VPN some analysis might be able to figure out what you're looking at based on traffic patterns.

[-] Auli@lemmy.ca 1 points 13 minutes ago

VPN is only blocking your IP. Every other way they track well still work. I mean what does a VPN gibe you? encryption all sites are https hide DNS from ISP there is DOT and DOH. Last one is SNI that could be fixed by ECH if sites used it.

[-] skulblaka@sh.itjust.works 11 points 12 hours ago

We need a browser extension that will add or remove a random number of dummy browser extensions per session to further obfuscate the fingerprinting

[-] howrar@lemmy.ca 10 points 12 hours ago

https://amiunique.org/ shows you many of the things they can check for

[-] wonderingwanderer@sopuli.xyz 7 points 12 hours ago

Holy shit, that's a lot of data. I had no idea they could see what language packs I have installed on my keyboard. I have a pretty unique combination of languages, so that probably makes me really easy to identify across platforms.

Is there an easy way to disable or block fingerprinting?

[-] wonderingwanderer@sopuli.xyz 3 points 12 hours ago

Some VPN providers offer a setting that makes it harder to analyze traffic patterns. They make every packet the same size and send them at regular intervals along with extra noise. It makes everything look uniform so that AI can't match your traffic to/from the VPN server with traffic between the VPN server and your web activity.

It might be overkill, and it adds latency and uses extra data. But for maximum paranoia, it's an option

[-] ken@discuss.tchncs.de 2 points 9 hours ago* (last edited 9 hours ago)

You still need to use a privacy-centric browser

Check out Konform Browser. Least leaky one out there.

[-] Sprinks@lemmy.world 3 points 9 hours ago

but did you disable the lesser known tab history (firefox)? Hamburger menu >> History

this post was submitted on 14 Apr 2026
357 points (100.0% liked)

privacy

9380 readers
423 users here now

Big tech and governments are monitoring and recording your eating activities. c/Privacy provides tips and tricks to protect your privacy against global surveillance.

Partners:

founded 3 years ago
MODERATORS