Open ghost opened 5 years ago
...and, conversely, if you care about privacy in the face of bad actors and want to ensure evercookie and related technologies are defeated on a technical level without giving yourself decision fatigue:
<canvas>
element. (CanvasBlocker also does the same for other known types of fingerprinting such as audio API fingerprinting.)about:config
and set browser.sessionstore.privacy_level=2
to prevent things like window.name
from being persisted in the session restore system.signon.autofillForms
to False, so Firefox's password manager will always behave as if you have multiple accounts saved in the password manager for the given site. (To prevent sites from watching for un-prompted auto-fill to identify you even when you're choosing not to log in.)chattr +i
to set it immutable in a way distinct from the usual "Do I have write permissions?" that things check for.)
https://github.com/samyk/evercookie/issues/114 Since the issue remains open but seemed to have died out years ago so I can't reply to the original issue; I'll throw in my method here.
All the 'easyprivacy' block script is doing blocking out the request for anything containing the path "/evercookie/". You can bypass block scripts by just changing the name to anything else. It is a very ez-pz thing to step around.
To fight against block script patterns that may occur after first method fails: For best results just random cache the php file names with a list of random names. For better results have the name list be around 1000+ random names / hashes and guid formats. Then check if the request was handled or not. There are different ways this can be done. If not re-generate with the next name in list and delete old cache. Repeat until true or error out page.
Most block script regex patterns can't even match against that kind of generation and is much better than hash / guid caching your file / directory names.