this post was submitted on 20 Nov 2025
406 points (97.9% liked)

Technology

77084 readers
1633 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Amidst the glossy marketing for VPN services, it can be tempting to believe that the moment you flick on the VPN connection you can browse the internet with full privacy. Unfortunately this is quite far from the truth, as interacting with internet services like websites leaves a significant fingerprint. In a study by [RTINGS.com] this browser fingerprinting was investigated in detail, showing just how easy it is to uniquely identify a visitor across the 83 laptops used in the study.

As summarized in the related video (also embedded below), the start of the study involved the Am I Unique? website which provides you with an overview of your browser fingerprint. With over 4.5 million fingerprints in their database as of writing, even using Edge on Windows 10 marks you as unique, which is telling.

you are viewing a single comment's thread
view the rest of the comments
[–] afox@lemmy.world 24 points 2 weeks ago (3 children)

Good luck I'm behind 7 proxies

[–] undefined@lemmy.hogru.ch 4 points 2 weeks ago (2 children)

I’m here with multi-hop VPN with the first two hops staying in-country and the rest all random + a shit load of DNS blocking lists and browser extensions + blocking Google. I use different VPN providers too. I’m also introducing variable delays to my traffic to make NetFilter data less helpful.

[–] GreenShimada@lemmy.world 10 points 2 weeks ago (2 children)

Please understand that browser extensions make you more easy to track. I used to be under the same assumption, but uBO is as far as you should go. fingerprints include your extensions.

[–] undefined@lemmy.hogru.ch 5 points 2 weeks ago (1 children)

My thinking is that most of the fingerprinting is happening by third parties, and where it’s the website operators themselves I’m not super concerned about being fingerprinted.

[–] GreenShimada@lemmy.world 2 points 2 weeks ago (1 children)

Look at the uBO trackers on each site and you'll br surprised how often Google comes up.

[–] undefined@lemmy.hogru.ch 1 points 2 weeks ago (1 children)

From their domain that I’ve already blocked with DNS? Or are you talking about first-party scripts calling Google (which I’ve also seen though much more rare)?

In any case I block those too.

[–] GreenShimada@lemmy.world 1 points 2 weeks ago

Google tag manager, which would be first party scripts now.

[–] artyom@piefed.social 4 points 2 weeks ago (1 children)

That depends on whether your browser exposes them, and if/how they affect your fingerprint. If you go to deviceinfo.me it will show you what your browser is exposing.

[–] GreenShimada@lemmy.world 2 points 2 weeks ago* (last edited 2 weeks ago)

Yeah, there's also the covermytracks.eff.org and amiunique.org and https://abrahamjuliot.github.io/creepjs/index.html which is my favorite

[–] Nighed@feddit.uk 1 points 2 weeks ago

If you go to the site, what does it think of your fingerprint?

[–] ZoteTheMighty@lemmy.zip 0 points 2 weeks ago

That's the point. It doesn't matter how many middle layers there are, if you're using a web browser, there are hundreds of pieces of information that can still be used to uniquely identify you. Do you have WebGL enabled? If so, you could be identified with 100 constantly changing proxies.