Is brave the only browser with fingerprint randomization?
Is brave the only browser with fingerprint randomization?
I believe no. I’m running Firefox with arkenfox user.js and when I take this test www.bromite.org/detect it shows a new and different fingerprint id everytime i close and reopen the browser. Feel free to try it for yourself.
And while Brave may be private from outsiders, it is far from private from Brave Software themselves and I wouldn’t trust them if I was honest with you. If you want an alternative chromium based browser, check out Vivaldi. They don’t have aaaas many privacy features built in as Brave does but you can still get very private and obviously tack on Ublock origin and a customized DNS block list like you normally would with any other browser. And they are significantly more trustworthy than Brave
What is unprivate about brave software? Assuming all telemetry is turned off and the browser is configured for strictest of settings no crypto no telemetry no java ect session cookie delete ect ect. Do we have RCP happening? I have never set brave up behind traffic analysis to see what outbound traffic gets sent that was not from the user.
Besides the above the only off putting thing I’m aware they have done is installed their VPN software without permission on dekstop which I found myself before I seen the news about it.
So far, as far as I can tell, for desktop, yes.
Brave plus privacy badger seems to be the strongest anti-fingerprint that you can lay your hands on at the moment.
I have waded waist deep through about 15 anti-Brave posts where people have told me to try different combinations of plugins and browsers. Somebody claimed duckduckgo would do it, but once I installed it and found out it didn’t support plugins, I walked away immediately.
Everybody seems to direct most of their hate toward the CEO and the crypto. As far as I’m concerned those two things don’t bother me anywhere near as much as their thirst for funding. I’m pretty sure they wouldn’t have any qualms about selling 100% of my data off to anyone willing to pay to stay afloat. But in the end that’s probably not all that different from Microsoft or Google.
Brave is keeping up with the Joneses for YouTube ad blocking. It’s reasonably quick and supports all of my Chrome plugins.
I absolutely cannot get Firefox to pass the fingerprint test. If I could convince Firefox to pass that test I would strongly consider backing off my usage of brave.
It's very telling when the only criticism you really see levied against Brave is that same article everybody posts as some kind of trap card, despite the fact it can be boiled down to "don't use Brave because the CEO is a bigot or something, and you have to opt out if their crypto stuff." Cool. 8 don't care about those things, I care about the browser's ability to do what I need it to, and Brave does. Are you putting your trust in a company that could be selling you data? Sure, that's always a risk, but until it's been confirmed, I'm happy to stick with it. I mean shit, it even beats out GrapheneOS's Vanadium in the fingerprinting test, and that's the browser I use on my phone.
imo, the hate against Brave is unfounded and seems to be coming from the anti-Chromium crowd. There are valid arguments to be made against it, but I honestly couldn't give less of a fuck what their CEO believes as long as the product works as advertised.
Exactly, it’s childish cancel culture for completed unrelated nonsense. It’s one thing to be anti Chrome, but being anti Chromium is stupid, let alone that brave did a good job about it.
I’d like to see what peoples personal opinions are on every single Firefox dev, as well as the complete Mozilla corporate hierarchy… Oh ya, they don’t know, so it’s cool. Then of course the completely history and belief system of the devs of every browser addon they use as well. That type of stupidity has no end.
You don’t want a randomised fingerprint, as that is relatively unique among a sea of fingerprints [1]. What you want is a fingerprint that’s as similar to everyone else (generic) as possible; that’s what Firefox’s resist fingerprinting setting aims to do, and what the Tor browser does.
[1] There are many values you can’t change, so the randomisation of the ones you can change could end up making you more unique … think of it like having your language set to french but are based in the USA — that language setting can’t uniquely identify the French in france, but will stick out like a sore thumb if set in shitsville Idaho. It’s likely the same if you use firefox but have your user agent set to chrome; that’s more rare and unique than not changing the user agent at all.
I don’t think there is any proven results, but I think the reason the EFF prefers Braves decision is the philosophy that there are so many data points that it could be possible to link you to it using the ones not standardized by anti fingerprinting.
Like police putting out an abp. One describes a guy correctly but generically. One describes a guy with a lot of detail but the wrong race and two feet too short.
Where do the EFF recommend randomisation? From the EFF’s surveillance self defence course.
This can be an effective method for breaking persistence, but it is important to note that a tracker may be able to determine that a randomization tool is being used, which can itself be a fingerprinting characteristic. Careful thought has to go into how randomizing fingerprinting characteristics will or will not be effective in combating trackers.
They don’t directly recommend either…
Digital fingerprinting is the process where a remote site or service gathers little bits of information about a user's machine, and puts those pieces together to form a unique picture, or "fingerprint," of the user's device. The two main forms are browser fingerprinting, where this information is delivered through the...
No, that’s absolutely incorrect. You want a new fake fingerprint every single time someone asks your browser for your information. You want it to lie about your plugins, user agent, your fonts and your screen size. Bonus if you use common values, but not necessary.
The randomized data they’re providing isn’t static and it isn’t the same from session to session.
100% White noise is a far better obfuscation than a 40% non-unique tracking ID. Yes, your data is lumped in with 47 million other users, but used in conjunction with static pieces of your data you become uncomfortably identifiable.
mullvad browser which is a TOR browser fork, seems to defeat fingerprint.com per-session.
brave strict fingerprint protection on its own actually does not even do this afaik
Yes. Brave focuses on providing random data points each time it’s asked (e.g. screen size). A hardened Firefox will try to provide a generic fingerprint.
Apples to oranges more or less, I’m unaware of any proof that one or the other is considerably better across the board. Though my gut does tell me that randomization is a lot better in the specific situation of regularly signing in and out of accounts.