

I’ve yet to see a serious review of Duckduckgo browser, the only thing I saw was that because of it’s agreement with Microsoft for their search engine the browser, for a time, had rules to avoid blocking Microsoft tracking.
I’ve yet to see a serious review of Duckduckgo browser, the only thing I saw was that because of it’s agreement with Microsoft for their search engine the browser, for a time, had rules to avoid blocking Microsoft tracking.
Sadly Firefox has no tab sandboxing on mobile so yeah, it is less secure.
And while I agree the Brave company is shady, the browser has good security features.
I don’t know, if your goal is security Pixels have the best hardware and GrapheneOS the best software. It makes a lot of sense.
And what about the person the thieves sells it to?
It’s not worthless but it’s on only an indication, an example.
Isn’t the score change similar to the one you have when toggling Apple safebrowsing? (whatever that is)
A probable explanation is that your VPN client is somehow changing some of your browser settings. The VPN client, not the VPN itself.
Just check the detailed results to see what’s changed between the two. Whatever it is it could be changed manually, it’s does not require a VPN to change. But you probably don’t want to change it because your score with a VPN is worse than without.
But this has nothing to do with a VPN being the best or the worse.
That’s side effects, the difference is irrelevant anyway.
I insist because I think it’s important to understand this, both for you and for people reading these comments. The whole point of fingerprinting is to be able to track users without relying on cookies or IP. Changing IP does not protect against fingerprinting. I don’t want people to be mislead by your comment and think they are going to avoid tracking by just taking a better VPN.
You can read more here:
https://coveryourtracks.eff.org/about#browser-fingerprinting
“Browser fingerprinting” is a method of tracking web browsers by the configuration and settings information they make visible to websites, rather than traditional tracking methods such as IP addresses and unique cookies.
And you can check the source code to see there is no mention of IP address:
https://github.com/EFForg/cover-your-tracks/blob/master/fingerprint/fingerprint_helper.py
It might have a side effect but it’s still unrelated and useless for the purpose at hand.
Tails uses the Tor Browser which does a lot to minimize fingerprinting, for example by letterboxing so the screen size (one of the most unique information in my case) is rounded as to not be as unique.
A VPN is unrelated, it changes your IP but the IP is not used to fingerprint.
But then they can know a lot more since they don’t even need to drop a cookie to track you. But that’s a different threat model.
It isn’t completely right either. Browsers, extensions and, only in some cases, VPNs can save you from being tracked by some. You are describing first party tracking but the point is mostly to prevent third party tracking. An adblocker and an email relay goes a long way.
I agree with the rest though. Regulation is the only way.
Not exactly.
uBlock Origin blocks the widgets (with the “EasyList – Social Widgets” blocklist, I don’t remember if it’s on by default). As would any other blocklist based blocked do like Privacy Badger, uBO is just better.
FF’s strict mode has something called Total Cookie Protection that makes it so Facebook widget on site A cannot read the cookie dropped by the Fackebook widget on site B. It isolate 3rd party cookies for each website.
Because it doesn’t bring anything more than Firefox in strict mode and uBlock Origin.
Drop IDCAC and Privacy Badger, add consent-o-matic, sponsorblock and bypass paywall clean.
Check Arkenfox for Firefox config and extension recommendations.
https://github.com/arkenfox/user.js/wiki/4.1-Extensions
Only use temp mails for unimportant, one-shot account, otherwise use an email relay.
It’s a good thing to be able to communicate without sarcasms when it’s not called for.
But I don’t think it’ll change, feel free to try and make a PR but you’ll also need to setup a server to host the releases and update.xml
.
You are right, my bad, last change seems to be a year ago.
But uBlock Origin does not set update_url
in it’s manifest.json
so it won’t update automatically. You’d have to do it manually every time.
It’s really standard to leave some time for users to adapt when making a big change. Especially end users. It’s actually a good thing, the “friend showing up” analogy makes no sense.
End of support for users is June 2024.
But it did seem to have changed a year ago or so, my bad.
But if the extension is removed from the store you will not get updates.
Brave does farbling: https://github.com/brave/brave-browser/issues/11770
JShelter is a nice extension that tries to implement the same things in other browsers, it’s a bit limited by the fact that it’s an extension.
https://jshelter.org/farbling/