Welcome to Incremental Social! Learn more about this project here!
Check out lemmyverse to find more communities to join from here!

@Redjard@lemmy.dbzer0.com avatar

Redjard

@Redjard@lemmy.dbzer0.com

Keyoxide: aspe:keyoxide.org:KI5WYVI3WGWSIGMOKOOOGF4JAE (think PGP key but modern and easier to use)

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Redjard , to Privacy in A web browser extension for accessing I2P network anonymously
@Redjard@lemmy.dbzer0.com avatar

Yes, those could be detected.
Ill see how large that portion is on my system in a bit, but I would expect it to come out as the minority.

Non-detectible ones I can think of rn:

  • Tab muting manager
  • VPN manager
  • link redirect skippers
  • stats printers, like a tab counter
  • dynamic shortcuts, like opening the archived version of the current page on archive.org
  • old reddit redirect
  • cookie managers

Many more of the ones you listed won't be detectable on most websites.

userscript managers (grease/tamper/violentmonkey etc.)

A userscript manager is by definition detectible only on pages you define or install a userscript for. Even then, modern userscript managers like tampermonkey are running scripts in a separate scope that is completely sandboxed from the actual websites js context, you can't even pass an object or function to the website and access it there, it will fail.
Youtube has actively fought some userscripts and failed, which they probably wouldn't have if those userscripts were detectible.

User theme managers should be similar, but I can't comment on them as I don't use any.

page translators

Translators are only detectible when enabled.

addons serving in-browser ads

Why would you have an addon that serves ads?

site-specific UI improvements (RES, SponsorBlock, youtube/SNS tweaks)

Are site-specific, i.e. not detectible anywhere else

privacy blockers (CanvasBlocker/JShelter/etc.)

Please don't use those anymore, use only uBo. Same for uMatrix.
uBo is pretty good about not being detected, for obvious reasons.

Redjard , to Privacy in A web browser extension for accessing I2P network anonymously
@Redjard@lemmy.dbzer0.com avatar

I found this is the only thing I found on a quick search.
It would indicate that chrome does disclose addons (so maybe don't use it for yet another reason).
For Firefox you can only look for changes typically performed by an addon, something like adblock should be detectible but networking layer stuff like an I2P tunnel should definitely not be.

Most firefox addons dont even have the permissions needed to change anything a website could observe.

Redjard , to Privacy in A web browser extension for accessing I2P network anonymously
@Redjard@lemmy.dbzer0.com avatar

I don't see any extension info and I don't see how there could be any. There isn't any api for gaining this info in ff at the very least.

There are other issues, but most extensions can in fact not be detected by websites, unless they specifically add something that makes them detectable.

Redjard , to Privacy in Signal under fire for storing encryption keys in plaintext on desktop app
@Redjard@lemmy.dbzer0.com avatar

TPM isn't all that reliable. You will have people upgrading their pc, or windows update updating their bios, or any number of other reasons reset their tpm keys, and currently nothing will happen. In effect people would see Signal completely break and loose all their data, often seemingly for no reason.

Talking to windows or through it to the TPM also seems sketchy.

In the current state of Windows, the sensible choice is to leave hardware-based encryption to the OS in the form of disk encryption, unfortunate as it is. The great number of people who loose data or have to recover their backup disk encryption key from their Microsoft account tells how easily that system is disturbed (And that Microsoft has the decryption keys for your encrypted date).

Redjard , to Privacy in Privacy concerns with DHCP (DHCP fingerprinting)
@Redjard@lemmy.dbzer0.com avatar

The default on android is to give every wifi network its own random but static mac.

Redjard , to 196 in 40 Kilobyte Rule
@Redjard@lemmy.dbzer0.com avatar
Redjard , to linuxmemes in GNU-Linux
@Redjard@lemmy.dbzer0.com avatar

Firefox+PlasmaWayland+SystemD+portage+GNU+Linux

Redjard , to 196 in hush rule
@Redjard@lemmy.dbzer0.com avatar

And a grandmaster at that! Has such unpresidented talent ever been seen on this world?

Redjard , to 196 in hush rule
@Redjard@lemmy.dbzer0.com avatar

Shoutout to boost at this point for still not supporting spoilers btw. /s
@rmayayo if you needed a reason, observe

Redjard , to Memes in Linkedin
@Redjard@lemmy.dbzer0.com avatar

This really seemed like a good simplification until you threw in that d'Alembert operator at the end

Redjard , (edited ) to Privacy in Today I got greeted on a Tor friendly website
@Redjard@lemmy.dbzer0.com avatar

Default linux works too ofc, I didn't know they took that route.
Most other browsers have very specific useragents, so the main pool of same useragents will be hardened browsers anyway.

Thank you for checking

edit:
https://github.com/TheTorProject/tor-messenger-build/blob/581ba7d2f5f9c22d9c9182a45c12bcf8c1f57e6e/projects/instantbird/0001-Set-Tor-Messenger-preferences.patch#L354 would indicate it should be Windows, Ill check later.
Try it with high security settings in tor, it might be something like canvas. Did you enable any permissions for the website?

Redjard , to Comic Strips in Tip of the ice shark
@Redjard@lemmy.dbzer0.com avatar

I was joking about everyone sending the alt text in a slightly different style. Hence also "alttext"

Redjard , to Privacy in Today I got greeted on a Tor friendly website
@Redjard@lemmy.dbzer0.com avatar

That would be a fail of the fingerprinting protection. A properly set up TOR browser for example should not allow that detection by any means. If you know how to detect it, please report it as a critical vulnerability.

I could think of maybe some edge case behavior in webrenderer or js cavas etc., which would mainly expose info on the specific browser and underlying hardware, but that is all of course blocked of or fixed in hardened browsers.

Further, if you have a reliable method, you could sell it off to for example Netflix, who are trying to block higher resolutions for Linux browsers but are currently foiled by changing the useragent (if you have widevine set up).

Redjard , to Privacy in Today I got greeted on a Tor friendly website
@Redjard@lemmy.dbzer0.com avatar

That can't have been the reason, rather the fact it could tell.
Your browser sends information about its version and the os in the useragent string. It is supposed to lie and say it is a very commonly used useragent, specifically for purposes of fingerprinting. That would be windows, default configuration, firefox version something not you firefox version

Redjard , to Comic Strips in Tip of the ice shark
@Redjard@lemmy.dbzer0.com avatar

Alttext:
| Concealed mostly beneath the surface, sharks are the icebergs of the sea.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • incremental_games
  • meta
  • All magazines