this post was submitted on 19 Jun 2025
309 points (98.4% liked)

Technology

72137 readers
2844 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
all 42 comments
sorted by: hot top controversial new old
[–] hansolo@lemmy.today 86 points 1 week ago* (last edited 1 week ago) (1 children)

Headline should read "Websites have been tracking you by browser fingerprinting for a while. Google publicly doing it for 6 months."

Test your footprint: https://abrahamjuliot.github.io/creepjs/

https://www.amiunique.org/

[–] MCasq_qsaCJ_234@lemmy.zip 3 points 1 week ago (1 children)

How effective is the TOR browser against CreepJS?

[–] hansolo@lemmy.today 5 points 1 week ago

100%. They all look the same.

[–] rottingleaf@lemmy.world 23 points 1 week ago (1 children)

Things which were obvious for any paranoid I2P user 15 years ago, and were being discussed in Freenet 20 years ago, and by cypherpunks 30 years ago, are again new and unexpected.

See, you can murder people in the open if you can make it comfortable enough for everyone to ignore it.

Surveillance and censorship should be scarier, because without them you can cry out about the murderer or avoid strategic disadvantage against the murderer, but are not - most people haven't been in real danger they understood. And even if they were - suppose that's already happening, people are being murdered in the open, censorship and surveillance happen, and the latter causes more outrage, - we all can see nobody cares enough to pay with a few bruises for opposing it, not just their living, health, life.

Here we are.

[–] homesweethomeMrL@lemmy.world 1 points 1 week ago

I didn’t see anything about this in my facebook feed.

/s

[–] Boddhisatva@lemmy.world 20 points 1 week ago (2 children)

Really bad headline. The actual article is about a study showing that browser fingerprinting is being used in real time in pricing target ads to your browser.

To investigate whether websites are using fingerprinting data to track people, the researchers had to go beyond simply scanning websites for the presence of fingerprinting code. They developed a measurement framework called FPTrace, which assesses fingerprinting-based user tracking by analyzing how ad systems respond to changes in browser fingerprints. This approach is based on the insight that if browser fingerprinting influences tracking, altering fingerprints should affect advertiser bidding — where ad space is sold in real time based on the profile of the person viewing the website — and HTTP records — records of communication between a server and a browser.

“This kind of analysis lets us go beyond the surface,” said co-author Jimmy Dani, Saxena’s doctoral student. “We were able to detect not just the presence of fingerprinting, but whether it was being used to identify and target users — which is much harder to prove.”

The researchers found that tracking occurred even when users cleared or deleted cookies. The results showed notable differences in bid values and a decrease in HTTP records and syncing events when fingerprints were changed, suggesting an impact on targeting and tracking.

Additionally, some of these sites linked fingerprinting behavior to backend bidding processes — meaning fingerprint-based profiles were being used in real time, likely to tailor responses to users or pass along identifiers to third parties.

[–] benignintervention@lemmy.world 7 points 1 week ago (1 children)

I have never been able to figure out how to block fingerprinting without entirely disabling my browser and it looks like the race to the bottom is accelerating

[–] reksas@sopuli.xyz 4 points 1 week ago (2 children)

maybe blocking it is the wrong way to go about though. Instead there should be some way to make the fingerprinting data worthless by having everyones browser constantly change things in the background so the fingerprint changes too

[–] frenchfryenjoyer@lemmings.world 16 points 1 week ago

This isn't new. Reddit is infamous for this too

[–] shneancy@lemmy.world 14 points 1 week ago

i mean, yeah?

the cookies you accept, the addons you have, hell, even the size of your monitor when you maximalise the window is a part of your browser fingerprint

anyone who's ever downloaded the Tor browser will know it. that browser screams at you if you try to maximalise or install addons exactly because of that

[–] fubarx@lemmy.world 11 points 1 week ago (1 children)

They were doing this a decade ago, to help track app marketing campaigns.

IIRC, it turned out you could get pretty close to uniquely identifying a device with permutations on only 7 attributes. The problem is if you install a plugin to return false data, it could break non-malicious websites, like running games or data visualizations.

[–] qqq@lemmy.world 2 points 1 week ago (1 children)

Am I misunderstanding something? Wouldn't that just be 7! = 5040 possibilities?

[–] Evkob@lemmy.ca 10 points 1 week ago (1 children)

You're mistakenly assuming the attributes are binary, stuff like screen resolution, regions, languages all have many possible values to help narrow down and identify you. It really doesn't take that many for you to be identifiable.

[–] qqq@lemmy.world 2 points 1 week ago

Oh right, thanks

[–] homesweethomeMrL@lemmy.world 11 points 1 week ago (1 children)

Mullvad has a fork of Firefox they built with TOR (the organization, it does not route over TOR network). Includes NoScript and ublock origin and works by making all browsers the same ( so long as you don’t fsck with it).

You don’t have to use it with their VPN but that’s good, too.

My only complaint is it doesn’t support containers. Otherwise it’s wonderful.

https://mullvad.net/en/browser

[–] Fijxu@programming.dev 8 points 1 week ago

+1. Mullvad browser is the best when it comes to browse the clearnet (not Tor). Also, if anyone reading this, do not compile Mullvad browser yourself, only use the official binary from the Mullvad site (or the -bin variant if you use Arch Linux AUR) since from my testing, different compiled versions of Mullvad browsers come with different fingerprints.

Using an optimized build from CachyOS and using it on CreepJS will give you a low amount of visits, same goes with the Flatpak build, but the binary from the Mullvad site gives around 2k views, which means that at least 2k people have the exact same fingerprint as you, but of course, it counts the people that have visited CreepJS to test their fingerprint. There is also fingerprint.com which seems to be wayyy more advanced.

[–] the_riviera_kid@lemmy.world 10 points 1 week ago

They have been for years.

[–] Mwa@thelemmy.club 7 points 1 week ago* (last edited 1 week ago) (1 children)

This is why I use Firefox + Canvasblocker + ublock origin I try to disable Javascript if it isn't required for functionality for the stuff am doing or I trust the site (using noscript)

Noscript on my personal machines

Marketers are a pox

If you’re a marketer, fuck you get a real job.

[–] theseer@lemmy.zip 6 points 1 week ago
[–] MonkderVierte@lemmy.zip 5 points 1 week ago

Lets you question how digital stalking is still allowed?

[–] TuxEnthusiast@sopuli.xyz 4 points 1 week ago (1 children)

I heard about a browser extension that could spoof fingerprints.

[–] Mwa@thelemmy.club 2 points 1 week ago (1 children)
[–] TuxEnthusiast@sopuli.xyz 1 points 1 week ago

Yes thank you

[–] fjordo@feddit.uk 3 points 1 week ago (3 children)

I really wish there was a foolproof way of preventing fingerprinting. Disabling JavaScript unfortunately isn't really an option, no-one builds websites with progressive enhancement in mind these days.

[–] AceSLS@ani.social 4 points 1 week ago (1 children)

JShelter and uBO medium mode to the rescue. Pair that with Librewolf and you're pretty secure against fingerprinting.

[–] fjordo@feddit.uk 2 points 1 week ago

Thanks for recommending JShelter! I'll add it to my list

[–] tux0r@feddit.org 3 points 1 week ago (1 children)

The more people disable JS, the more websites won’t require it.

[–] Ulrich@feddit.org 5 points 1 week ago

It's just unrealistic to expect any size of the population to even understand what JS is, much less understand why and how it's problematic and even beyond that, how to disable it, and even further to expect them to walk away from the 90%+ of sites using it on the web.

[–] Mwa@thelemmy.club 2 points 1 week ago* (last edited 1 week ago)

Same you can try noscript but its not very effective from blocking fingerprinting from what I know

[–] altphoto@lemmy.today 3 points 1 week ago (1 children)

Could we just create random fingerprints each time the website was visited?

[–] SomethingBurger@jlai.lu 3 points 1 week ago* (last edited 1 week ago)

Yes, but if they combine your fingerprint with your IP, they can see that there are 9 unique fingerprints and several others seemingly changing at random, ergo 10 people.

[–] cupcakezealot@piefed.blahaj.zone 3 points 1 week ago (1 children)

privacy.resistFingerprinting

[–] tux0r@feddit.org 2 points 1 week ago (1 children)

Why is that even an option you can disable?

[–] jadelord@discuss.tchncs.de 5 points 1 week ago (1 children)

It is not the default because it can also break meaningful functionality.

[–] tal@lemmy.today 3 points 1 week ago* (last edited 1 week ago)

Seems like it might be useful to have a per-site toggle.

[–] Fijxu@programming.dev 1 points 1 week ago

Soooo, how do I access the full article? I have to pay? Lol