346
submitted 16 hours ago* (last edited 15 hours ago) by streetfestival@lemmy.ca to c/privacy@lemmy.ca

This is about cookie banners on websites

There was another time I got into a very serious ontological discussion with a fairly senior engineer about what the difference was between taxes and fines and they didn’t understand there was a difference,” he said.

you are viewing a single comment's thread
view the rest of the comments
[-] wonderingwanderer@sopuli.xyz 15 points 11 hours ago

Private tabs do nothing for the backend, your ISP, browser, search engine, and any sites you visit, can still see everything you do. All private tabs do is they don't save history or cookies on your frontend.

VPN hides your data from your ISP, but there are still workarounds. Multi-hop can make you harder to triangulate though.

You still need to use a privacy-centric browser and search engine or else the ones you use can still send information about you back to their servers where they can build a profile on you. They won't have your real IP address as long as you never connect without a VPN, but any little data they collect on you can be collated with the rest to profile you and potentially identify you.

Even with browsers like firefox or waterfox, you still need to enable all of the security settings or else there are gaps that can be exploited. HTTPS-only mode, DNS over HTTPS, anti-tracking extensions, etc...

Even then, I wouldn't be surprised if there's an unseen gap somewhere. But it's a lot better than using google and microsoft and no vpn.

[-] ken@discuss.tchncs.de 2 points 7 hours ago* (last edited 7 hours ago)

You still need to use a privacy-centric browser

Check out Konform Browser. Least leaky one out there.

[-] testaccount789@sh.itjust.works 8 points 11 hours ago

Also, browsers still send so much unique data that they can be reasonably well fingerprinted. I don't really know all the things, but you can combine info such as OS, browser version, window size, list of extensions, HTTP request headers, timezone, etc...
Plus you could also track behavior.
And even with VPN some analysis might be able to figure out what you're looking at based on traffic patterns.

[-] skulblaka@sh.itjust.works 11 points 10 hours ago

We need a browser extension that will add or remove a random number of dummy browser extensions per session to further obfuscate the fingerprinting

[-] howrar@lemmy.ca 10 points 10 hours ago

https://amiunique.org/ shows you many of the things they can check for

[-] wonderingwanderer@sopuli.xyz 7 points 10 hours ago

Holy shit, that's a lot of data. I had no idea they could see what language packs I have installed on my keyboard. I have a pretty unique combination of languages, so that probably makes me really easy to identify across platforms.

Is there an easy way to disable or block fingerprinting?

[-] wonderingwanderer@sopuli.xyz 3 points 10 hours ago

Some VPN providers offer a setting that makes it harder to analyze traffic patterns. They make every packet the same size and send them at regular intervals along with extra noise. It makes everything look uniform so that AI can't match your traffic to/from the VPN server with traffic between the VPN server and your web activity.

It might be overkill, and it adds latency and uses extra data. But for maximum paranoia, it's an option

this post was submitted on 14 Apr 2026
346 points (100.0% liked)

privacy

9380 readers
416 users here now

Big tech and governments are monitoring and recording your eating activities. c/Privacy provides tips and tricks to protect your privacy against global surveillance.

Partners:

founded 3 years ago
MODERATORS