@dcoderlt oh SHIT
yepppppppp. shit. that sounds right on. shit shit shit.
@dcoderlt oh SHIT
yepppppppp. shit. that sounds right on. shit shit shit.
@ireneista @dcoderlt Sometimes some things will let a Tor browser through when they let nothing else. (I think they just don't know all the servers to block or something. Even if they block some, if I try a few new circuits I often get through.)
Might be worth a try if you really want to look for it anyway.
@ireneista @dcoderlt The best thing for me is knowing that whatever tracking stuff they use gets royally screwed with by using Tor. (I mean, as long as you don't log in somewhere or put in something identifying like a phone number or something.) Same IP address, same stats, but different people at different times.
It's a small one, but it's always fun to throw a wrench in the gears. π
@ireneista @dcoderlt They only can if you do something actually identifying. A lot of people don't realize just how much truly qualifies as that of course though. If you're always visiting the same sites with the same URLs for example, that might qualify. Especially if there is something more unique such as a set of configuration options in there. (Like configuring DuckDuckGo via URL instead of cookie.)
But it does do a lot of things that do help break most trackers. For example, setting fixed window sizes. The less of anything you change, the more you look like everyone else.
Except probably everyone should set their security level to "safer" instead of the default. (In particular WebGL is bad.)