- cross-posted to:
- [email protected]
- [email protected]
- cross-posted to:
- [email protected]
- [email protected]
What score does your browser(s) get?
I’ll start: I got:
one in ~25000 browsers have the same fingerprint as yours
What score does your browser(s) get?
I’ll start: I got:
one in ~25000 browsers have the same fingerprint as yours
There is also fingerprint.com, which I tend to trust more since it’s a company that literally sells fingerprinting tech to other companies.
It managed to identify me while using the Tor browser on “Safer” (doesn’t work on “Safest” due to JS). Edit: this is likely due to an issue with my install, and not the browser itself.
How did it identify you via tor? Were you using the browser bundle? Completely vanilla?
Did you refresh your session between tests?
Completely vanilla, fully stopped and restarted the browser. This was right after the 13.0 update.
For what it’s worth I just tested.
Tor browser 13.0.1, plus U-Block origin, fingerprint.com did not identify two different sessions
I should test again then, not sure what happened
Just did a fresh install on Linux (fresh download too) and unfortunately, with no settings changed except security to “Safer”, it once again identified me across multiple sessions.
FWIW it does change my ID if I resize the window enough to jump to a different size letterbox.
Edit: forgot to mention, the fresh install got a different ID ti the previous install.
Something is very curious about your install.
if you want to debug this: in tor browser, double check your using tor, try out whatismyipaddress.com, change circuits and make sure it changes again.
Look at the bits of entropy that coveryourtracks.eff.org shows, it could be something funky like an environment variable letting in system fonts.
Yeah I’ll do some investigating, good to know that the Tor browser isn’t at fault though (I probably should’ve operated under this assumption in the first place).