this post was submitted on 12 Jul 2024
98 points (97.1% liked)
Privacy
31998 readers
1116 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
Chat rooms
-
[Matrix/Element]Dead
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
these two do not mix well. almost any extension can be detected by a site and used to fingerprint you.
https://abrahamjuliot.github.io/creepjs/
You actually can use I2P with JS disabled as many eepsites work without it.
Yes you're right, but disabling JS also makes you stand out way more wrt fingerprinting, and you can still be fingerprinted with HTML/CSS, TLS and other methods.
On i2p- and onion-sites, I guess having JS disabled is far more common than on normal internet, so "standing out" is not really a concern.
Disabling JS helps reduce the many many other fingerprintable metrics and replaces it with one. One that is rare, but not uncommon in the worlds of I2P or Tor.
That is not true. On chrome, they could be fingerprinted using the way that extensions load remote assets (which I dont think is still possible). On Firefox, that has not been possible (maybe ever but at least for a while). The way that extensions are fingerprinted requires detecting the way they interact with the web pages DOM, which is not something many extensions do.
check out how creepjs implements detection for many common extensions...
The point to my original comment is fingerprint of extensions isn't straightforward or free, ie requires intentionally designing a fingerprinting technique tailored to identify its behaviour.
CreepJS can really only detect Chrome extensions and very few Firefox ones. On Firefox, it can detect NoScript but not uBlock for example. This isn't to say that uBlock can't be fingerprinted, just that it hasn't yet in CreepJS. Some extension don't touch the DOM at all or produce any fingerprintable behaviour to the web page, so there for can't be detected. Some don't produce weird behaviour until a user interacts with some element in the extension or webpage.
Yes you are right. I don't think there is a realistic way for most people to be anonymous or private online anymore given all these offensive and invasive techniques being used regularly now. Hell cloudflare fingerprints people with TLS alone, and that doesn't care about javascript or anything else above it.
I don't see any extension info and I don't see how there could be any. There isn't any api for gaining this info in ff at the very least.
There are other issues, but most extensions can in fact not be detected by websites, unless they specifically add something that makes them detectable.
perhaps you should look up how creepjs implements detection for known extensions
I found this is the only thing I found on a quick search.
It would indicate that chrome does disclose addons (so maybe don't use it for yet another reason).
For Firefox you can only look for changes typically performed by an addon, something like adblock should be detectible but networking layer stuff like an I2P tunnel should definitely not be.
Most firefox addons dont even have the permissions needed to change anything a website could observe.
Very strong disagree, I have seen and used many very widely used extensions that manipulate the DOM, which IMO satisfies your criteria of "something that can be observed" i.e. by javascript with a fingerprint tracker like creepjs.
Some examples:
ad blockers (uBO/uMatrix/etc.)
color/theme management (dark reader/dark theme/Stylish/etc.)
custom mouse cursor managers
page translators
addons serving in-browser ads
userscript managers (grease/tamper/violentmonkey etc.)
privacy blockers (CanvasBlocker/JShelter/etc.)
site-specific UI improvements (RES, SponsorBlock, youtube/SNS tweaks)
All of these can be detected and included as yet another bit of data that a unique fingerprint can be built from.
Yes, those could be detected.
Ill see how large that portion is on my system in a bit, but I would expect it to come out as the minority.
Non-detectible ones I can think of rn:
Many more of the ones you listed won't be detectable on most websites.
A userscript manager is by definition detectible only on pages you define or install a userscript for. Even then, modern userscript managers like tampermonkey are running scripts in a separate scope that is completely sandboxed from the actual websites js context, you can't even pass an object or function to the website and access it there, it will fail.
Youtube has actively fought some userscripts and failed, which they probably wouldn't have if those userscripts were detectible.
User theme managers should be similar, but I can't comment on them as I don't use any.
Translators are only detectible when enabled.
Why would you have an addon that serves ads?
Are site-specific, i.e. not detectible anywhere else
Please don't use those anymore, use only uBo. Same for uMatrix.
uBo is pretty good about not being detected, for obvious reasons.