Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fingerprintjs still seems to get a constant fingerprint #410

Closed
ilikenwf opened this issue Nov 29, 2019 · 7 comments
Closed

fingerprintjs still seems to get a constant fingerprint #410

ilikenwf opened this issue Nov 29, 2019 · 7 comments

Comments

@ilikenwf
Copy link

I'm using canvasblocker, resistFingerprinting, and some other even more paranoid settings from the ghacks user.js file...

Despite this, fingerprintjs seems to be able to get a constant or near constant fingerprint from my browser.

https://fingerprintjs.com/demo

I'm not entirely sure if it is the canvas, but I would expect that with various configurations this hash should change every page load if I've not got "constant" set, correct?

@kkapsner
Copy link
Owner

If you use resistFingerprinting the canvas fingerprint will not change. But it will be the same to all TOR users and all other users that enabled it. See #158 and arkenfox/user.js#767 for further reading.

But I'm quite sure this page uses some sort of persistent storage to keep the ID. It does not change for me upon reload but if I use a private window it does (closing the private window and opening another one also changes it).

What do you get when you open the page in a private window?

@ilikenwf
Copy link
Author

ilikenwf commented Nov 30, 2019 via email

@ilikenwf
Copy link
Author

...disabling resistFingerprinting has fixed the randomnness.

On the upshot I have most of the bases that resistFingerprinting covered between my user.js and other addons, as well as canvasblocker.

@ilikenwf
Copy link
Author

ilikenwf commented Nov 30, 2019 via email

@ilikenwf
Copy link
Author

I'm not playing with them, but they're on and have default values despite the main resistFingerprinting option being turned off...unless it disables the entire class of mitigations I'd argue there's little to worry about.

Considering that most fingerprinting is done using something like fingerprint.js, I would argue it is more important to avoid a consistent fingerprint than it is to do things the correct way until this issue is worked around and canvasblocker can randomize and coeexist with the resistFingerprinting option.

Most of what you see here is me spoofing, and I have RFP off... the canvas fingerprint is as it is because I'm spoofing it randomly instead of using an all white alpha channel, which if I recall is what the tor project does?

image

@kkapsner
Copy link
Owner

@ilikenwf great - then we found the source of the constant fingerprint. In that case all users of RFP should share the same fingerprint as you and you are harder to track within that crowd. My point in that discussion is that both approaches (having the fingerprint change all the time and sharing a fingerprint with a lot of other people - an analogy for the first would be to identify real people by the number of mouths they have and for the second one to do that by the number of seconds they are alive) are valid and will both protect you. I decided to go in CB with the "change always" way as it's easier to do and maintain.

You two can continue to discuss but as CB is out of the picture I will close the issue.

@Thorin-Oakenpants the UA test page reports exactly the same result for all methods for me (I have the UA changed via CB). As far as I know the methods are similar to the ones in https://canvasblocker.kkapsner.de/test/test.html - just something else was read.

A sandboxed iFrame is kind of protected agains changes: https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#attr-sandbox

@ilikenwf
Copy link
Author

Most of my fingerprinting mitigations revolve around emulating tor browser, including the spoofed UA.

As such I can at best suggest that using "none - completely white" for the canvas with RFP enabled and spoofing a common resolution is the best option. Despite the results I'm still unique within 51,000 visitors, so I wonder if any of this is worth it or if some of my settings need to be further tuned.

Suggestions welcome:
image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants