346
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 14 Apr 2026
346 points (100.0% liked)
privacy
9380 readers
416 users here now
Big tech and governments are monitoring and recording your eating activities. c/Privacy provides tips and tricks to protect your privacy against global surveillance.
Partners:
- community.nicfab.it/c/privacy
founded 3 years ago
MODERATORS
Private tabs do nothing for the backend, your ISP, browser, search engine, and any sites you visit, can still see everything you do. All private tabs do is they don't save history or cookies on your frontend.
VPN hides your data from your ISP, but there are still workarounds. Multi-hop can make you harder to triangulate though.
You still need to use a privacy-centric browser and search engine or else the ones you use can still send information about you back to their servers where they can build a profile on you. They won't have your real IP address as long as you never connect without a VPN, but any little data they collect on you can be collated with the rest to profile you and potentially identify you.
Even with browsers like firefox or waterfox, you still need to enable all of the security settings or else there are gaps that can be exploited. HTTPS-only mode, DNS over HTTPS, anti-tracking extensions, etc...
Even then, I wouldn't be surprised if there's an unseen gap somewhere. But it's a lot better than using google and microsoft and no vpn.
Check out Konform Browser. Least leaky one out there.
Also, browsers still send so much unique data that they can be reasonably well fingerprinted. I don't really know all the things, but you can combine info such as OS, browser version, window size, list of extensions, HTTP request headers, timezone, etc...
Plus you could also track behavior.
And even with VPN some analysis might be able to figure out what you're looking at based on traffic patterns.
We need a browser extension that will add or remove a random number of dummy browser extensions per session to further obfuscate the fingerprinting
https://amiunique.org/ shows you many of the things they can check for
Holy shit, that's a lot of data. I had no idea they could see what language packs I have installed on my keyboard. I have a pretty unique combination of languages, so that probably makes me really easy to identify across platforms.
Is there an easy way to disable or block fingerprinting?
Some VPN providers offer a setting that makes it harder to analyze traffic patterns. They make every packet the same size and send them at regular intervals along with extra noise. It makes everything look uniform so that AI can't match your traffic to/from the VPN server with traffic between the VPN server and your web activity.
It might be overkill, and it adds latency and uses extra data. But for maximum paranoia, it's an option