I’ve just been playing around with https://browserleaks.com/fonts . It seems no web browser provides adequate protection for this method of fingerprinting – in both brave and librewolf the tool detects rather unique fonts that I have installed on my system, such as “IBM Plex” and “UD Digi Kyokasho” – almost certainly a unique fingerprint. Tor browser does slightly better as it does not divulge these “weird” fonts. However, it still reveals that the google Noto fonts are installed, which is by far not universal – on a different machine, where no Noto fonts are installed, the tool does not report them.

For extra context: I’ve tested under Linux with native tor browser and flatpak’d Brave and Librewolf.

What can we do to protect ourselves from this method of fingerprinting? And why are all of these privacy-focused browsers vulnerable to it? Is work being done to mitigate this?

  • @ssm
    link
    48
    edit-2
    4 months ago

    Disable javascript, trying to get around fingerprinting with javascript enabled is an exercise in futility, and is especially risky with something as heavily monitored as tor.

    • @bionicjoey@lemmy.ca
      link
      fedilink
      163 months ago

      Disable javascript

      This is like those people who say that the only form of safe sex is abstinence. Technically true, practically useless.

      • @renzev@lemmy.worldOP
        link
        fedilink
        English
        73 months ago

        I’m slowly starting to agree with @ssm that safeguarding against fingerprinting is an exercise in futility though…QubesOS sounds like something that might help though, since it makes it easy to browse from a virtual machine with fonts and other settings that may be leaked set to the most bog-standard defaults.

        On a related note, disabling javascript can actually improve your user experience quite a lot for certain types of tasks. A lot of news/blogs/article-style websites nowadays are actually more usable without javascript, because you don’t have to waste time closing all of the ads and cookie popups. I have a separate browser profile with js disabled and use it quite a lot.

      • @Alk@lemmy.world
        link
        fedilink
        English
        13 months ago

        No script lets you individually allow js on certain sites, even specific sources. Block all by default, allow safe sites or temporarily allow other sites based on need. I started doing that this year and it hasn’t been nearly as much trouble as I thought it would be.

      • @ssm
        link
        15
        edit-2
        4 months ago

        It should, but I guess this user disabled it. I visited the same site with javascript disabled and it can’t fingerprint it (not in tor browser, I don’t trust it (css has nasty fingerprinting capabilities, huge mozilla codebase), I use w3m with torsocks and my useragent set to tor browsers, also tested qutebrowser with js disabled).

          • @ssm
            link
            4
            edit-2
            4 months ago

            stated in post, w3m, a text browser (unless it wasn’t there when I last edited it, I’m a very sporadic editor)

            • ComradeSharkfucker
              link
              fedilink
              English
              5
              edit-2
              4 months ago

              Never heard of w3m, will check it out

              Edit: I thought I was paranoid for using tor as a daily browser lmao

      • lemmyreader
        link
        fedilink
        English
        33 months ago

        Tor has noscript automatically enabled no?

        There’s three security settings via NoScript in Tor browser. The default has JS enabled.

    • lemmyreader
      link
      fedilink
      English
      63 months ago

      Disable javascript, trying to get around fingerprinting with javascript enabled is an exercise in futility, and is especially risky with something as heavily monitored as tor.

      I like disabling JS myself for some web browsing but this can make fingerprinting easier because most people do enable JS, and I’ve read that with JS disabled certain things still can be detected through CSS files.

      • @ssm
        link
        53 months ago

        easy, disable css too (text browsers do this) :)

      • @EngineerGaming@feddit.nl
        link
        fedilink
        23 months ago

        I feel like on Tor specifically, disabled JS is far more common than on clearnet connections so not as big of an issue.