WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

1.3K

Here is the brief history.

  1. VPN fired up, opened Tor browser a month or two ago
  2. Created burner email account via Tor Browser
  3. Used burner email to open a new Gab.com account (also via Tor Browser)
  4. Posted a lot of JQ facts, got a bunch of followers etc, only using Tor Browser
  5. Made a reply about HT possibly being controlled opposition, immediately blocked by the OP and gang raped by HT groupies
  6. Next morning: I can log in, but I can't post. Everything is a "403 status" when I try to post or comment.

New tor circuits don't fix it (I've tried at least 100 times). No changes to my Tor version or anything else. I guess I'm banned from Gab.

The timing is suspicious.

Edit: so I figured it out. They started blocking Tor exit nodes for comments and reactions. The account wasn't shadow banned.

Here is the brief history. 1. VPN fired up, opened Tor browser a month or two ago 2. Created burner email account via Tor Browser 3. Used burner email to open a new Gab.com account (also via Tor Browser) 4. Posted a lot of JQ facts, got a bunch of followers etc, only using Tor Browser 5. Made a reply about HT possibly being controlled opposition, immediately blocked by the OP and gang raped by HT groupies 6. Next morning: I can log in, but I can't post. Everything is a "403 status" when I try to post or comment. New tor circuits don't fix it (I've tried at least 100 times). No changes to my Tor version or anything else. I guess I'm banned from Gab. The timing is suspicious. Edit: so I figured it out. They started blocking Tor exit nodes for comments and reactions. The account wasn't shadow banned.

(post is archived)

[–] 0 pt

Well, it does.

https://blog.torproject.org/browser-fingerprinting-introduction-and-challenges-ahead/

Tor + Fingerprinting

Tor Browser was the very first browser to address the problems posed by fingerprinting as soon as 2007, even before the term “browser fingerprinting” was coined. In March 2007, the changelog for the Tor button indicated the inclusion of Javascript hooking to mask timezone for Date Object.

In the end, the approach chosen by Tor developers is simple: all Tor users should have the exact same fingerprint. No matter what device or operating system you are using, your browser fingerprint should be the same as any device running Tor Browser (more details can be found in the Tor design document).

[–] 0 pt

Sounds nice in theory. If one way actually worked then all the "privacy browsers" would be doing it instead of all trying different methods to stop fingerprinting. Brave's latest attempt is interesting. They use randomization. Tomayto, Tomahto. But you can bet your ass (((they))) have a very unique fingerprint for all of your devices... Facts!