Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It seems to me whether you're going to make fingerprintable properties be the same or randomize them, you're always going to need to explore every angle. Otherwise a bad actor can just ignore all the properties you randomize and focus on what's left.


Very few data points used in browser fingerprinting are 100% unique to an individual. Multiple data points are combined to form a hash that is unique to an individual. Most people have a unique fingerprint.

You can sort out your TOR browser traffic by user agent then focus on a single data point to track a small number of those users (probably to the individual level because TOR browser traffic is uncommon) but a website can't always know what's been/being randomized and can't separate out the randomized users from everyone else with a unique fingerprint.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: