this post was submitted on 07 Jul 2025
61 points (100.0% liked)
Privacy
3173 readers
59 users here now
Welcome! This is a community for all those who are interested in protecting their privacy.
Rules
PS: Don't be a smartass and try to game the system, we'll know if you're breaking the rules when we see it!
- Be civil and no prejudice
- Don't promote big-tech software
- No apathy and defeatism for privacy (i.e. "They already have my data, why bother?")
- No reposting of news that was already posted
- No crypto, blockchain, NFTs
- No Xitter links (if absolutely necessary, use xcancel)
Related communities:
Some of these are only vaguely related, but great communities.
founded 8 months ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Librewold + ublock origin + canvas blocker in help to u
i thought librewolf already has some canvas fingerprint blocking?
It does. You may need to enable it.
Yes it does ,but canvas blocker doing much more advance blocking also u can change a lot parameters in there for faking
Thanks, maybe CanvasBlocker will be less breaking than JShelter. By the way, I recommend AdNauseam, which is a uBlock Origin fork that clicks the ads before hiding them (and without loading their results, so it takes no extra data) to confound advertisers with garbage data.
Plus Mullvad VPN.
NoScript
It will be annoying to use AT FIRST. One you have it set up for all your sites it won't be so bad.
No script cannot protect u from on websites which require js for work and thus it cannot protect u from creepjs things and so it required to spoof everything from resolution to os fingerprints
Yes, but it blocks many external scripts from running in the first plce. Like, a LOT. Some websites try to pull from 20 external sites when only one or two are needed to run the site's functionality. You get fine control, and also get the no-JS experience first.
Tor Browser. You just described part of a fingerprint, tbb is a more common print.
I don't trust for browser if honestly https://blog.torproject.org/new-release-tor-browser-145/
Before they were spoofing user agent now not hidding