• blargh513@sh.itjust.works
    link
    fedilink
    arrow-up
    5
    ·
    3 hours ago

    That’s the magic of fingerprinting. They don’t need what we would consider are the “real” signals like IP address anymore.

    They can create a composite value based on boring stuff like the things you mentioned, plus a few others. They can pull fun stuff like the details of your TLS handshake OS, browser, versions of various plugins/addons, etc. Given 20+ signals they can fingerprint you pretty well. They store it and just profile you, follow you around.

    VPNs, privacy addons are just more signals to use to fingerprint you. You stand out even more when you try to hide. It’s been this way for a while now.

      • blargh513@sh.itjust.works
        link
        fedilink
        arrow-up
        3
        ·
        2 hours ago

        Really?

        No.

        It’s been this way for a while. At best, you can use some techniques to provide plausible deniability from a legal perspective.

        Not that laws matter anymore.

        The best you can do is try to blend in.

        • chicken@lemmy.dbzer0.com
          link
          fedilink
          arrow-up
          2
          ·
          2 hours ago

          I don’t understand why this should be inherently impossible. If you buy a separate device, and use that exclusively for one thing and do not cross-contaminate, that should work to avoid fingerprinting right? And this is all information that your computer is voluntarily providing, and is I assume possible to change independently from the hardware. So why not?