- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
cross-posted from: https://fed.dyne.org/post/343234
Google Starts Fingerprint-Tracking All Your Devices In 8 Weeks
cross-posted from: https://fed.dyne.org/post/343234
Google Starts Fingerprint-Tracking All Your Devices In 8 Weeks
Glad I don’t use any Google services and no apps on graphene OS then for my main computers I run Fedora silverblue with no Google once again.
Yes but do you use PiHole and a solid VPN? Do you spoof your browser’s useragent? Even then, some would argue that you are not safe enough from Google’s prying eyes.
Doesn’t matter, your browser will be fingerprinted with some embedded JavaScript that works in all modern browsers.
It doesn’t matter if they detect you’re on a VPN when that VPN is shared by tens of thousands or millions of others. Thats literally the point. It prevents fingerprinting by IP
“User connects via VPN XYZ” is part of the fingerprint. It doesn’t protect you from identifying you, instead it ads to the number of unique properties of your computer and connection, adding to the size of your fingerprint. Besides, a lot of VPNs and proxies add another header x-forwarded-for with your original IP. Source: I worked on multiple e-commerce platforms that use fingerprinting as part of their fraud protection. Also see https://coveryourtracks.eff.org/learn for a more detailed explanation.
Of course it protects you. You can’t use the internet without an IP address. The best IP address is one that’s shared with as many people as possible. That’s why people use VPNs.
Of course you get a fingerprint. The key is to have a fingerprint thats shared by as many people as possible.
Map car retreats around corner
TorBrowser does all of this for you.