I have been testing Tor Browser and Mullvad Browser using fingerprint.com. I get unique persistent identifiers that are unique per machine and persist over rebooting sessions. Javascript was on during this test.
This could be very dangerous to people using Tor Browser and Mullvad Browser.
For example, if someone visits Rainbow Railroad, an organization for leaving repressive countries with hostile LGBT policies, and then watches a video about the organization on YouTube, and then also does something, like create a Discord Server, and use Tor Browser to get around geoblocking but link it to their personal phone number, then a hostile regime buying data from data brokers could possible determine that user is considering using rainbow railroad. Even if this exact example isn’t realistic or plausible (although governments do buy form data brokers), users should be aware that persistent identifiers in Tor Browser and Mullvad Browser allow for continuous tracking of a user using the same machine.
I posted this information on privacyguides forum and they deleted my account after, leading me to wonder if the forum is a giant honeypot that curates acceptable privacy discussions and unacceptable private discussions. I honestly wonder if they are infiltrated by the government. They repeatedly delete the posts of other people as well and the whole thing is starting to not sit well with me
OC write up by @someone@lemmy.today
nah, i just visited and fingerprint.com’s demo errantly id’d me as having visited 5x previously even though first time.
Maybe you share the same fingerprint as OP because that’s how Tor is supposed to work.
That’s my point. ‘My’ fingerprint is being matched with others.
@cm0002@literature.cafe you’re going too far with the reposting IMO and I urge to revalidate your entire approach.
This is a user question copy-pasted without their consent (and possibly even knowledge; they may not be getting notified of your reshare despite the @).
Others may overlook that the OP has no involvement in the post here and post answers that the OP never becomes aware of (since you gracefully remove links to the source post).
Besides, you’re literally incentivizing people to prefer posting on
.mlin order to then be reshared by your accounts elsewhere. By rebroadcasting .ml content (especially when at a higher rate than other content), you’re introducing perverse incentives and cobra-effecting your whole anti-.ml-operation by driving posters to .ml. Even readers, when they end up browsing it from digging up the original sources for posts like this one.There are other (I assume unintended) negative side-effects of what you are doing and they way you are doing it. You are single-handedly reshaping threadiverse but maybe not the way you intended or for the better…
Do you mean that the fingerprints are unique among your computers, or that they’re unique among users of “fingerprint.com”? Just wondering. More analysis than you’ve done so far would be needed before you’re ready to start giving anti-fingerprinting tips to the makers of Tor Browser.
Yeah… Every browser has a fingerprint. Tor is about 12 bits heavy on the EFF tool if I remember correctly. Not bad to be 1/4000 ish


