Open intika opened 5 years ago
i dont know if a strict immitation really helps that much because tor users can be identified by ip and any further deviation from the norm for usability like custom window sizes or adblockers makes it possible to differenciate. it is important to attempt a fingerprint that is as consistent as possible but it might be technically impossible or not doable without costly compromises to reach 100% identical fingerprints. immitating the tor browser is particularly difficult because it tries to be as homogeneous as possible. it's for example easier to immitate a common firefox configuration because a slight deviation would not be thought of as a different browser and thus can be random data.
i suggest a quick setting like this:
(1) would select from a small list of profiles that attempt to mimic a very certain browser as closely as possible. difficult to create and may require compromises but might be useful to circumvent browser lockouts. (2) tries to superficially imitate a browser in a way that fools most websites. might be the better choice for a real "good enough" adversary that only uses some fingerprinting methods and doesnt do complex analysis
@elypter thank you for your feedback...
I think anti-fingerprint feature should be kelp at simple as possible and should only provide 2 ways of fighting fingerprint, the "randomize" one is approved for sure but for the second one we need to discuss it further.
Choice over a settings page:
(1) In both of those cases easy accessible whitelist needs to be available
Also check https://addons.palemoon.org/addon/eclipsedmoon/