Help me get 5 ticks here

panopticlick.eff.org/
here you go i have first 3 ticked what about the last 2?

Attached: Capture.png (1348x633, 221K)

Other urls found in this thread:

browsersize.com/
wiki.mozilla.org/Security/Fingerprinting)
twitter.com/SFWRedditGifs

You want the last one ticked but not number 4, do the last one with uMatrix

tried uMatrix the laxt one still has a x mark , is there a specific configuration for uMatrix that make it go tick?

Don't bother with DNT it was a mistake. Did they seriously think companies would stop tracking users just because of a HTTP header? For last one, use Tor Browser.

i saw a youtube video once which mentioned that if youre the only one using tor in your locality/area you can be easily tracked down,can this also be considered one of the tor issues

Laughing my fucking ass off, who would be dumb enough to follow number 4?

>turn JS off
>lay a big fat SHIT on trackers

Attached: 1450621849629.jpg (2346x1341, 235K)

What would it take to make perfect encryption and make everyone online anonymous? What are the main factors? ISPs? The root name server? Could a network be built from the ground up and adopted to be completely anonymous?

The relays are public so it's fairly easy to tell if someone is using Tor based on which IPs they connect to. They can, for most part, not know what you used it for, though. I say for most part because some guy did get v& for using Tor on the uni network to make a bomb threat. I think he took a plea deal though, not sure the evidence would've held up in court (threat was made to uni from a Tor exit node and he was the only student using Tor at the time).

this is what i was talking about,thanks for elaborating user

so tor is not that safe amirite?

>Help us defend the Web against tracking:
>share on facebook!

lmfao so druuu

1. about:preferences#privacy
-Choose what to block
--All Detected Trackers (disable) [keep DNT header disabled, you'll use uBO anyway]
--Third-Party Cookies (enable), set to All

2. about:preferences#general
-Language and Appearance
--Fonts and Colours
---Advanced
----Allow pages to choose their own fonts (disable)

3. about:config
privacy.resistFingerprinting > true
webgl.disabled > false
privacy.firstparty.isolate > true

4. about:addons
install "uBlock Origin"
install "user-agent switcher"

5. user-agent switcher
set your user agent to "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"

6. Set your current resolution to 1000x700.

You're thinking of Tor

>guy uses Tor
>"ladies and gentlemen of the jury, the defendant HACKED the school network and used it to make a BOMB threat"
>silence and gasps from the jury
>guilty
any computer related case is ridiculously easy for a prosecutor to get a conviction

THIS

No im not, because tor is flawed. I mean hardware level encryption across all connections.

>hardware level encryption across all connections.
This cannot solve the problem of anonymity.

That's a vague statement, sure it can, Prove me wrong.

>6. Set your current resolution to 1000x700.

what the fuck kind of resolution is that??

>----Allow pages to choose their own fonts (disable)
Most people allow websites to define the fonts so this is going to make you stand out. The best here is to have nothing but default fonts installed, something a bit problematic for GNU/Linux users.

>privacy.resistFingerprinting > true
Don't remember 100% what this does but might break some websites

>privacy.firstparty.isolate > true
This helps a lot but IIRC it wipes all your history, cookies and other saved data because FPI stores entries differently due to having to keep track off domains.

>set your user agent to "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
There are other ways to detect OS so pointless to pretend to be another OS if you're using GNU/Linux. At most you should set it to match release version of your browser if you're using beta/nightly since it has a smaller user base.

>6. Set your current resolution to 1000x700.
Bad idea. No one outside of Tor users have this resolution. Screen resolution gets a bit problematic for GNU/Linux users because of inner browser window. On Windows you have the window decorations, the task bar and the browser UI itself that by default occupy a certain amount of pixels (don't know exact amount but let's say 60 px for all of them). On GNU/Linux there isn't the same level of standardization, especially if you configure things yourself, so even if both you and another person use 1920x1080 you can have two different inner window dimensions.

Being realistic the easiest and most effective ways to combat tracking are to use uBlock Origin to block trackers, disable third-party cookies, enable first party isolation (might break some websites) and preferably only enable JavaScript when necessary because JavaScript can access a lot more system information than what is possible without.

>prove it can't
You're the one stating it can, without any proof or reasoning.
Encryption only solves the issue of nobody knowing what's being transferred. You still need a way to connect to other computers and encryption has nothing to do with this process. That's the whole point of Tor/VPN.

>he doesn't know about canvas fingerprinting

lmfao

Resolution of Tor browser.

The whole point was to get the fingerprinting ticked. Which will happen if you follow all those steps.
>Don't remember 100% what this does but might break some websites
I don't see anything breaking.
>wipes all your history, cookies and other saved data
This is a good thing as I always have those deleted on exit anyways. Saved logins aren't removed so it's a non-issue.
>Screen resolution gets a bit problematic for GNU/Linux users
You can use browsersize.com/ to check, then add ResizeIT2 addon to save it.

>5. user-agent switcher
>6. Set your current resolution to 1000x700.
privacy.resistFingerprinting does both of these

>privacy.resistFingerprinting does both of these
No.
Doesn't change your user agent to windows. It leaves it on Linux if you're on Linux.
Doesn't change the screen resolution, it just hides it and tells the sites you visit that your monitor resolution = window resolution. If you were to maximize the window you'd lose a few pixels depending on your panel size. Also your monitor resolution can then be very easily guessed. This makes it much easier to fingerprint you.

What does canvas fingerprinting have to do with screen resolution...?

>The whole point was to get the fingerprinting ticked. Which will happen if you follow all those steps.
Yeah, okay.

Did some reading up on privacy.resistFingerprinting (wiki.mozilla.org/Security/Fingerprinting) and the only thing I find problematic is the following:
>The Keyboard Layout is spoofed
>The Locale is spoofed to en-US
>Timezone is spoofed to 'UTC'
This makes sense for Tor but IMHO you want these to match your geographic location. I mean, if you live in Norway, most people will have Norwegian locale and not US locale.

how important is the noscript plugin in firefox?

It's literally the entire reason to use firefox.

uMatrix is better. Noscript is kinda useless compared to it.