What do you guy recommend to use againt finger printing?
SlackwareThis Forum is for the discussion of Slackware Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
when I read up on that one it seemed to imply that others can tell that one is using tor and it sends up a red flag. So to me that is more dangerous then just using a different means because of that "red flag" letting Big Brother know that you just maybe up to something because you're not letting them spy on you so you get flagged by Big Brother.
I am not sure how true that maybe as I said it implied this. Not explicit but implied from what I read on it a few years back.
if you carefully read the documentation, you will see that you can put your tor traffic on port 80 which will lower your "footprint" against the usual methods used to detect tor usage. at that point, an adversary would need to use deep packet inspection to know for sure whether you are using tor or not. even better would be to use port 443 (https: ), and then your encrypted traffic would be more difficult to discern that it's tor traffic.
with the passage of legislation that allows ISP's to sell user data, i intend to use tor a lot more often for more mundane browsing. it's MY data.
If you are serious about anonymity you really ought to avoid using Tor from your home or any other place you consistently browse the web. This raises red flags.
Tor traffic can be used to identify you by discerning browsing habits. Another thing that can identify you is if you change your user agent to be something too strange. Those can set off red flags. So while you might think you are being sneaky, it can actually be what causes your traffic to be flagged for inspection.
The best way to achieve anonymity is to purchase a virtual private server with bitcoins. Preferably a server that is located in another country. Set up a VPN on it that connects and encrypts your traffic from home to the server. Then have all outgoing traffic sent out to Tor. Use the Tails live cd (https://tails.boum.org/) on your local machine. Do not go to high risk web sites. If you are connecting to your VPN from a public network you should spoof your MAC address.
Another thing that will help your anonymity is if you run a Tor relay on your home network. Or possibly on public networks you use. Your traffic can be confused with other Tor network traffic if you raise the amount of connections going in and out of this network. Anonymity through obfuscation.
Remember though. Tor does not encrypt your traffic once it leaves the Tor network. Anyone on the other end of your tor tunnel can see your traffic in plain text. So install a browser add on to force HTTPS. This will cause your browser to encrypt your traffic before it even enters the Tor network and when it leaves it will still be encrypted. Disable javascript and flash content as well.
I like to use these browser add ons on every browser I use, regardless of Tor usage:
Proxychains + Tor + privoxy can be configured to open a new Tor circuit for every connection you make and force a set hop range. For a web browser this means every HTTP/HTTPS request a web site makes, Tor will open a new TCP socket. It can be configured to randomize as many Tor network hops you wish to make. It would take a great deal of packet inspection to identify someone using such a configuration from a VPS purchased with bitcoins. I have to warn though, this slows down web browsing speeds considerably due to all the overhead.
Privoxy and ProxyChains both have SlackBuilds available.
uBlock development has stopped (last commit was made on August 2015), the development continues under the name uBlock Origin (https://github.com/gorhill/uBlock) and that's what you should use instead. Wikipedia article has an explanation on why there are two similarly named extensions.
uBlock development has stopped (last commit was made on August 2015), the development continues under the name uBlock Origin (https://github.com/gorhill/uBlock) and that's what you should use instead. Wikipedia article has an explanation on why there are two similarly named extensions.
Thanks for correcting me. I will update my post. I am using uBlock origin.
There are some other geo locations pointing to the default value so, i blank then in browser to see
if that stops the value from returning. I'll update if it does.
Last edited by GreenFireFly; 04-01-2017 at 11:52 PM.
I'm not surprised. Honestly I don't use Firefox, but I wouldn't put it past them to make it revert somehow. I use Pale Moon and all my settings hold, I just checked them.
Another note; Firefox is completely revamping their code and going to be based on the "Quantum" engine that is going to be replacing the "Gecko" engine that they are currently running. This is also going to affect A LOT of addons and plugins since they are migrating towards "WebExtensions". I have been reading that quite a few addon developers are no longer going to be developing for Firefox, I have no idea which addons are going to be affected.
This is supposed to be completed around November 14th 2017 and Firefox v57 according to the Mozilla release schedule. So everything will need to be relearned. I have no time for this nonsense, this is not the first time that Mozilla has decided to alienate their 3rd party developers and their users.
I have moved on from Firefox. Pale Moon is 1000x faster and the devs listen to their users. Not to mention that there is less that I have to do to make Pale Moon work and look like I want it to.
Here is a unverified preview/mock up of Firefox 57 via ghacks.
@Skaendo Yeah but, won't that also effect all mozilla based browsers?
This is what i found on the internet about web extentions.
WebExtensions are a cross-browser system for developing browser add-ons. To a large extent the system is compatible with the extension API supported by Google Chrome and Opera. Extensions written for these browsers will in most cases run in Firefox or Microsoft Edge with just a few changes. The API is also fully compatible with multiprocess Firefox.
So does this mean that who ever makes a web extention is going to work on all browsers? If so what is the purpose of using firefox if they all have the same extentions?
The change is not going to affect Pale Moon as far as I know. As we all know Pale Moon is a Goanna based pre-Australis Firefox fork.
I don't know about the extensions or what the migration to "WebExtensions" entails. All I know is what I have read about it, and one addon developer said that he has been rewriting one of his adons for over a year to try and make it "WebExtension" compliant and it was a no go so he just said screw you Mozilla and is dumping all his addon projects. And there are a bunch more right behind him.
With all the election hacking, more and more focus is on internet privacy, creating a surge in new tor users, as well as more anonymous forward proxies, such that as these measures become the norm, using them will no longer be the "red flags" that they once may have been!
@Skaendo I decide to try out pale moon 27.2.0. If you do a search in the about:config for useragent you will see a will see a bunch of entrys for usergent overrides. You might want to also disable
general.useragent.site_specific_override > false
Other wise you may think your using secret agent on those sites when your not.
I decide to try out pale moon 27.2.0. If you do a search in the about:config for useragent you will see a will see a bunch of entrys for usergent overrides. You might want to also disable
general.useragent.site_specific_override > false
Other wise you may think your using secret agent on those sites when your not.
In order for that setting to work, the site also has to be defined. I've attached a screenshot to elaborate on what I mean there. Every time you refresh a page go back and look at "useragent" in about:config. You'll see them spring to life and run through a bunch of random strings.
You might actually be defeating Secret Agent by setting that to false.
If you are in doubt, go to http://www.useragentstring.com/ and just hit refresh a few times. You'll see that your string is getting randomized every time you hit refresh.
I went to the site you mentioned. I also had set general.useragent.site_specific_override > false and in the site
it was still showing random browers. However i believe when you go to any of the sites that have the override set
it's not using the default useragent string and instead is using the override string thats why i mentioned it to you.
I went to the site you mentioned. I also had set general.useragent.site_specific_override > false and in the site
it was still showing random browers. However i believe when you go to any of the sites that have the override set
it's not using the default useragent string and instead is using the override string thats why i mentioned it to you.
general.useragent.site_specific_override > true
Go to google (since it one of the predefined overrides) and refresh, it changes in about:config from "default" to "user set" and a random string is generated.
I'm not worried about it.
But if it bothers you that much, you can blank out the predefined strings, and it will get randomized. I tried it with addons.mozilla.org
Honestly, I don't think it matters because I can go to anyone of those predefined sites and it gets randomized each time I refresh it. Even if it starts out as "default" and is defined.
(To tell the truth, I don't go to any of those predefined sites listed. I might go to google once a year so it doesn't bother me that much.)
EDIT: I do go to YouTube a couple times a week, and sometimes it tells me that I have a incompatible browser, so I know Secret Agent is working properly. YouTube is one of the predefined sites.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.