Skip to content

Latest commit

 

History

History
38 lines (27 loc) · 2.79 KB

File metadata and controls

38 lines (27 loc) · 2.79 KB

Browsers with countermeasures

The following list shows browsers that are capable of thwarting the technology implemented by nothing-private. Be aware that this only covers one aspect the possibilities to track you online.

There are fundamentally two technologies to thwart fingerprinting implemented in nothing-private:

Randomizing canvas data readout

Browsers implementing this approach randomize the readout of the canvas data obtainable by websites, making each read-out differ from the last. (Unless the readout is cached to be reused for the same site to make it harder to detect the countermeasures by the check being run twice.)

Browsers that implement this approach include

Browser Platform Version Reported By
Firefox Windows/Linux/Mac/Android v78+ cherti
Tor Browser Windows/Linux/Mac 10.0+ RickyRajinder
BriskBard Windows 1.6.9 jatinsharma28
Pale Moon (See notes) Windows/Linux 28.5.2+ jragard
Ungoogled Chromium (See notes) Windows/Linux/Mac 80.0.3987.149-2+ Nunbit
Bromite Android v77+ Nunbit
Brave Windows/Linux/Android v1.11.104+ 8ram

Making canvas data readout entirely static

This approach simply takes away the possibility to gain any information from the canvas read-out API alltogether by always blanking the returned value. This in turn makes every browser look alike with regard to this property, but as it looks the same for every single browser, it is rendered useless for tracking purposes.

Be aware that nothing-private may still look functional, but is rendered incapable of separating even entirely different browsers with this approach as every browser now looks the same with regards to the canvas property, see screenshot below.

Firefox tracking in action

Browsers that implement this approach include

Browser Platform Version Reported By
Tor Browser Windows/Linux/Mac 8.0 - 9.5 RickyRajinder
Firefox Windows/Linux/Mac/Android v58 - 77 cherti