346
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 14 Apr 2026
346 points (100.0% liked)
privacy
9380 readers
416 users here now
Big tech and governments are monitoring and recording your eating activities. c/Privacy provides tips and tricks to protect your privacy against global surveillance.
Partners:
- community.nicfab.it/c/privacy
founded 3 years ago
MODERATORS
Also, browsers still send so much unique data that they can be reasonably well fingerprinted. I don't really know all the things, but you can combine info such as OS, browser version, window size, list of extensions, HTTP request headers, timezone, etc...
Plus you could also track behavior.
And even with VPN some analysis might be able to figure out what you're looking at based on traffic patterns.
We need a browser extension that will add or remove a random number of dummy browser extensions per session to further obfuscate the fingerprinting
https://amiunique.org/ shows you many of the things they can check for
Holy shit, that's a lot of data. I had no idea they could see what language packs I have installed on my keyboard. I have a pretty unique combination of languages, so that probably makes me really easy to identify across platforms.
Is there an easy way to disable or block fingerprinting?
Some VPN providers offer a setting that makes it harder to analyze traffic patterns. They make every packet the same size and send them at regular intervals along with extra noise. It makes everything look uniform so that AI can't match your traffic to/from the VPN server with traffic between the VPN server and your web activity.
It might be overkill, and it adds latency and uses extra data. But for maximum paranoia, it's an option