This could entirely be me being tired, and thus a little stupid right now, but how exactly are you rebooting the system? If it's by hitting the restart button, or powering off and back on, you may be having issues with something getting "stuck" in RAM, essentially. Try fully powering down the machine, disconnect the power cable (and battery if it's a laptop), press and hold the power button for 30+ seconds, then hook everything back up and test again. That should be enough to drain any little bits of electricity stored in the system, thus fully clearing anything that might've been hanging around from RAM. Also, make sure the browsers are fully updated and no outdated extensions/plugins/etc.
Using JavaScript defeats the purpose of Tor
I can actually replicated that. Tor Browser without extensions (only the default https anywhere and noscript) on Mac OS. Pretty scary? Wondering how this works.
Aha! I figured it out. Apparently my Tor browser got old extensions in there from older Tor versions (Tor Button and something i can't remember, they were set to deprecated and were disabled). I had Tor literally installed for... over 10 years or something, so I would imagine it didn't reset itself properly after doing one update or another. After removing the Tor Browser data folder and reinstalling it (for good measure, don't think that was necessary), I get random values on the page.
EDIT: One additional thought on that... I feel this is something Tor Browser should consider automatically when applying updates. At least a warning would be good to reset your data once in a while to stay non-unique.
It's wild to post something like this, and say things like "This impacts at least some operating systems or distributions," without indicating at all which ones you're having the experience with.
Skepticism is good here. However, I was not able to replicate this. On Mullvad and Tor, with "Safer" settings, both gave me a new ID after a browser restart.
Then this may be happening only with certain distributions or operating systems. It is definitely happening for me, I checked it over and over. "You have visited once." I close Tor Browser, restart, come back to fingerprint.com. "You have visited twice." I also did try this with safer. I did multiple tests. This impacts at least some operating systems or distributions. It may not impact Qubes. I didn't test that, but I am sure it impacts at least some users.
How are you installing the browsers? Flatpak? AppImage?
Wonder why privacyguides deleted the post
Whenever someone says they had a moderator action taken against them, I am suspicious. Some mod teams are notorious, sure, but it's almost always a case of unreliable narration.
I imagine behavior like the allcaps reply above had something to do with it.
Other users on privacyguides forums have commented on the exact same problem where threads are just completely deleted, even with valid questions.
"Javascript was on during this test."
I understand: Javascript is not safe. I know that. But most of the internet, except for onions, use javascript and it's nearly impossible to use most of the Internet in web browsers without it. The problem is that if Fingerprint.com can reliable detect differences between users when javascript is on for Mullvad Browser and Tor Browser in certain operating systems, users should be aware. Most people would think Mullvad Browser in "safer" mode would not create a persistent per-computer hash of the browser that can be tracked across sessions.
Yes, it's by design. You should probably read this https://mullvad.net/en/browser/mullvad-browser
They have different unique hashes per computer, so Tor Browser user on "Computer 1" has a unique hash and Tor Browser user on Computer 2 has a unique hash. I have read Mullvad's documentation on their browser. Please re-read the original post.
It has no clue who you are using tor. Just switch the circuit your on.
If all users have the same fingerprint then nobody is getting fingerprinted.
All users don't have the same fingerprint. Fingerprint.com is testing other things that Tor isn't covering. So if they are testing canvas and other stuff that Tor protects, and 2 things that aren't protected that give unique identifiers, they still create a unique hash. I did not test this using Tails or Qubes and it may not affect all operating systems.
Every browser has a unique fingerprint. The advantage of tor browser is EVERY user is matching the same fingerprint so you cannot tell who it is. If you run Firefox with a unique set of plugins, it will be unique to fingerprinting sites, but that is BAD. The fingerprint will identify you as you, rather than 1/all tor browser users on your OS.
They have different fingerprints PER COMPUTER without any plugins other than default of No Script. I tested this, it is not the same hash for every computer. It varies per computer and was persistent across sessions.
Are you testing windows v linux? Tor browser started reporting itself as Linux on Linux.
Privacy
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)