Enlighten me on how connecting to a good VPN and then to Tor using their browser isn't protecting me from device fingerprinting, considering that Tor browser is already configured in a way that the fingerprint is identical to every other Tor browser lol.
I don't doubt you understand the concept of fingerprinting. But you do not understand how deep that rabbit hole ACTUALLY goes... At least not based on your previous comments.
They spend a shit ton of time working on it: https://2019.www.torproject.org/projects/torbrowser/design/#fingerprinting-linkability
Fingerprinting is the devil's work. New Voat fingerprints users machines. "Allow canvas" popups when visiting the site show up once in a while.
Enlighten me on how connecting to a good VPN and then to Tor using their browser isn't protecting me from device fingerprinting lol.
Because all connecting to a VPN and Tor does is obfuscate your IP. It has nothing at all to do with fingerprinting lol.
Because all connecting to a VPN and Tor does is obfuscate your IP. It has nothing at all to do with fingerprinting lol.
Tor browser does more than obfuscate your IP.
Meh...
I'm not saying "I know more about it, I'm immune."
I'm saying "You should look into it more. NO ONE is immune."
(post is archived)