[-] privacybro@lemmy.ninja 10 points 11 months ago

mullvad browser which is a TOR browser fork, seems to defeat fingerprint.com per-session.

brave strict fingerprint protection on its own actually does not even do this afaik

[-] privacybro@lemmy.ninja 6 points 11 months ago

If it wasn't for all the survivalists and conspiracy theorists and paranoid software devs and whistleblowers and tech journos and anti-authoritarian content creators and anti-surveillance artists and even ordinary joes like me who just want to use online services withouth the digital equivalent of the weird kid in class who stood over your shoulder and watched everything you did (x1000), things could and would be much worse.

this. this is the privacy truth of the year right here. shout out to all the insane people. we dont deserve them.

[-] privacybro@lemmy.ninja 8 points 11 months ago

another reason why centralization sucks and distributed/decentralized messengers should rise to the top over time.

[-] privacybro@lemmy.ninja 15 points 11 months ago

i wish people would stop viewing this guy as someone who is a guru extreme online privacy.

Bazzell is good at one thing primarily, and that is Real Life privacy/hiding, when one's adversaries on nongovernmental. that is his specialty and what he should be respected for.

Bazzell is not a huge expert in thwarting mass surveillance or thwarting nation-state adversaries in technology. otherwise he wouldnt be giving recommendations that involve closed sourced software or cloudflare lol.

He is a practical guy and knows enough to keep his clientele's privacy for the types of adversaries he is accustomed to going up against (not nation state or federal gov)

[-] privacybro@lemmy.ninja 14 points 11 months ago

For alternatives, I recommend to use a community-ran Gitea instance. Project Segfault runs one.

https://about.gitea.com/

https://git.projectsegfau.lt/

Also check out Forgejo, it's another git software. Disroot has an instance.

https://forgejo.org

https://git.disroot.org/

[-] privacybro@lemmy.ninja 14 points 11 months ago

All of the suggestions here are good but I would not put too much stock in where you get your DNS from if your reasons are for privacy. If anything, using anything beyond your ISP's DNS could decrease your privacy, because now you are giving info to 2 providers (DNS and ISP)

No matter what DNS server you use, your ISP can see every single IP you connect to and doing reverse lookups is extremely trivial for them of course.

My advice is to use a good VPN provider. Any reputable one will also provide its own DNS servers as well.

[-] privacybro@lemmy.ninja 9 points 11 months ago

end to end encrypted file sharing server, Send: https://github.com/timvisee/send-instances/

jitsi conference room server, or matrix chat server.

you could run an Oxen node for the Session onion messenger, or a relay for the SimpleX messenger. these are especially important things we need to reduce decentralized messenger dependence.

PrivateBin (pastebin) instance

[-] privacybro@lemmy.ninja 10 points 11 months ago

dont run stock android. solved.

[-] privacybro@lemmy.ninja 8 points 1 year ago

social media isn't social. go out and meet people like a normal human being like we have done for thousands of years. get a jmp.chat number dedicated for randoms.

sounds like you want to use social media but dont want the guilt, so you made this post.

[-] privacybro@lemmy.ninja 6 points 1 year ago

What's your badge number? Or are you contracted

[-] privacybro@lemmy.ninja 15 points 1 year ago

I have been doing fingerprint research for several years. I've done countless builds with various browsers, configurations, extensions, and strategies. (Yes i have too much time for this).

Here is what I've concluded. I hope this helps someone.

CoverYourTrack is crap, plain and simple. Your best option will always be to randomize. Always. You will not "blend in". I don't care if you run Google Chrome on Windows 10 or Safari on iOS, JavaScript exposes way too much info, you will always have a unique fingeprint. Just go play around with fingerprint.com on some normie browser/os setups and you will see what i mean.

You must randomize all the values that you see on sites like browserleaks.com. canvas, audio context, webgl hash, clientrects, fonts, etc etc. I'd also make sure you are proxifying all your browsers and using random locations. You can do this with Brave somewhat, which has some randomization stuff in it. You can do this with browser extensions as well. Ungoogled chromium also has some randomization for canvas and clientrects i think

There are only a couple options outside of this that I recommend, in the realm of "generic fingerprint" solutions. TOR browser (they have been on the front lines of this for many years). And also Mullvad browser, which, despite its generic fingerprint goal, seems to also defeat fingerprint.com.

Tldr, if you want the best experience out of the box that is also very usable, just use Mullvad Browser. They are basically the browser i wished for for like a decade.

[-] privacybro@lemmy.ninja 22 points 1 year ago

Lol fr. It's like they watched all the movies and books about dystopia and thought, "okay, this looks good, let's do this"

Even the wording and grammar sounds like they are doing a 1984 parody

view more: next ›

privacybro

joined 1 year ago