Now sites can fingerprint you online even when you use multiple browsers
- Inicie sesión o regístrese para enviar comentarios
Here's one I found:
https://browserleaks.com/
I installed CanvasBlocker and though https://browserleaks.com/canvas shows me having a 100% unique id, it changes every time I refresh.
panopticlick's 'Hash of canvas fingerprint' changed every time I redid the test also.
https://browserleaks.com/javascript
with javascript enabled and then again disabled gives a good graphical idea of the power running javascript gives to the fingerprinters.
https://browserleaks.com/ip shows not only my ip but which dns server I am using also (but only with javascript enabled for their domain)
This is kind of old:
http://www.pcworld.com/article/2458280/canvas-fingerprinting-tracking-is-sneaky-but-easy-to-halt.html
It mentions addthis.com. I'm using a hosts file based on one found here:
https://github.com/StevenBlack/hosts
What I currently have shows:
0.0.0.0 ct1.addthis.com
0.0.0.0 s3.addthis.com
0.0.0.0 s7.addthis.com
0.0.0.0 s9.addthis.com
0.0.0.0 p.addthis.com
0.0.0.0 cf.addthis.com
0.0.0.0 o.addthis.com
0.0.0.0 addthiscdn.com
0.0.0.0 addthis.com
0.0.0.0 api.addthis.com
0.0.0.0 api-public.addthis.com
0.0.0.0 appdev.addthis.com
0.0.0.0 blog.addthis.com
0.0.0.0 cache.addthiscdn.com
0.0.0.0 cache.addthis.com
0.0.0.0 cache-dev.addthis.com
0.0.0.0 e1.addthis.com
0.0.0.0 s5.addthis.com
0.0.0.0 search.addthis.com
0.0.0.0 secure.addthis.com
0.0.0.0 sharebar.addthiscdn.com
0.0.0.0 status.addthis.com
0.0.0.0 su.addthis.com
0.0.0.0 ut.addthis.com
0.0.0.0 ws.addthis.com
0.0.0.0 www3.addthis.com
0.0.0.0 ***.addthiscdn.Altered because the wiki treated as a link
0.0.0.0 ***.addthis.Altered because the wiki treated as a link
I am using the Unified hosts = (adware + malware) hosts file - 32,000+ domains get routed to the bit bucket.
One hopes that every little bit of security helps.
- Inicie sesión o regístrese para enviar comentarios