this post was submitted on 20 Nov 2025
398 points (98.1% liked)
Technology
76949 readers
3495 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Hops don’t matter at all against fingerprinting, which includes things like fonts you have installed, the os, os version number, browser version, extensions, some browser settings/flags, timezone, keyboard layout, your screen resolution, dpi, and what ever the crap the ”canvas” has stored. So pretty much no matter what you do, you’re unique.
You can use some browsers that resist fingerprinting but guess what, those are so rarely used that again you shine like a beacon. I’m still yet to find an browser extension that would fake all my fingerprint parameters by setting them as what is the most common one in each category. So a Windows user running latest Chrome full screen on Fullhd monitor.
And there is nothing stopping websites running the fingerprinting services and scripts on their own server, albeit most rely on third parties for convenience, and these at least can be blocked.
Right, that’s why I mentioned all the blocking at the DNS and browser extension level — most fingerprinting is being done by third-parties — I generally don’t see first parties fingerprinting but if they do it’s likely a website I chose to be on rather than some shady
<script>from God knows where.Some privacy browsers will randomize your fingerprint
Randomized = unique, unless it is done ”smartly” by setting some very very common combo. Or unless it randomizes for every page load (which I recon would mess up many site functions, window width/height for example). And if there is not that many users having this on you shine like a beacon again as ”that randomizer guy”.
...no
I imagine it’s somewhere between what both of you are saying.
I imagine “randomized” means a random common “fingerprint” (with parameters like user agent, language, etc) rather than just a unique set of randomized parameters (say, time zone in US but language set to Farsi which would be unique to an extent).
I mean it doesn't matter if it's unique or not. What matters is that your fingerprint changes as you browse.
Sorry but that’s totally wrong.
The entire point is that if it’s unique it can be considered a fingerprint — in fact the entire reason it’s called “fingerprint” is that in theory it’s unique like a real fingerprint.
If it’s common then it’s unreliable as a fingerprint because it’s no longer unique. Therefore whether it’s unique or not is the entire point and relevant to the topic.
Sorry, but that's totally wrong.
Imagine if you changed your literal fingerprint. No one would be able to trace it back to you.
Likewise, if your fingerprint changes as you browse, those activities can no longer be linked together, because you no longer have a "fingerprint" at all.
Laughs in Tails Linux