Enlighten me on how connecting to a good VPN and then to Tor using their browser isn't protecting me from device fingerprinting lol.
Because all connecting to a VPN and Tor does is obfuscate your IP. It has nothing at all to do with fingerprinting lol.
Because all connecting to a VPN and Tor does is obfuscate your IP. It has nothing at all to do with fingerprinting lol.
Tor browser does more than obfuscate your IP.
Meh...
Well, it does.
https://blog.torproject.org/browser-fingerprinting-introduction-and-challenges-ahead/
Tor + Fingerprinting
Tor Browser was the very first browser to address the problems posed by fingerprinting as soon as 2007, even before the term “browser fingerprinting” was coined. In March 2007, the changelog for the Tor button indicated the inclusion of Javascript hooking to mask timezone for Date Object.
In the end, the approach chosen by Tor developers is simple: all Tor users should have the exact same fingerprint. No matter what device or operating system you are using, your browser fingerprint should be the same as any device running Tor Browser (more details can be found in the Tor design document).
I'm not saying "I know more about it, I'm immune."
I'm saying "You should look into it more. NO ONE is immune."
I don't want to be vulnerable to dragnet surveillance. What I'm doing is good for that requirement.
(post is archived)