Your browser fingerprint appears to be unique among the 60,953 tested so far

browserprint.info
>Your browser fingerprint appears to be unique among the 60,953 tested so far.
>15.9 bytes
is it even POSSIBLE to get a non-unique? I've done everything I possibly can here.

Attached: Screenshot from 2018-11-02 20-46-46.png (387x269, 98K)

Other urls found in this thread:

browserprint.info
twitter.com/AnonBabble

I got 15.9 bits too

Its very hard to get non-unique. Even in an enterprise scenario where you have 1000s of computers, it will be hard to get unique fingerprints.

Chrome on Android [Moto e4] and you're telling me I'm unique with 15.9 bits???

>only 2 other Nightly users have done this test before
And yet I also have 15.9 bites (at least on my first try).

you can manually overwrite entirety of browser.navigator object and other settings in sorosantifafox about:config to something commonly used version and build in windows, or even chrome (corporate moloch shitsites like youtube will break tho). this will also work for iframes, unlike spoofer webextensions do for most of the time. [and copy over Windows/Office fonts and even get rid of loonix ones if you're obsessed enough] HOWEVER, since ancient times, they have reliable tools out there for TCP/IP stack request analysis which tell that you're a loonix-using pedophile faggot anyway. i've read that only OpenBSD and maybe other BSD variants after long but feasible research and testing apply Windows-like tcp/ip stack behavior through system's firewall.

you use intel processor anyway lol.

>you need cookies enabled
>they are
wtf am I doing

Press the giant fingerprint on home tab
Need flashplayer to view results on android

Suck my nigger dick

If you're using Linux, configure your user agent string to show the same output as Chromium or Chrome on Linux do. The same goes for Windows. You would still be unique, but with the wrong data. Also, disable Javascript wherever possible. You can continue using the browser you like.

>Screen size: 1occurrances

>Screen size: 1 occurrance 1/60,923 1631x947
How do I get it to see something more default than that? What is the best default?
>Screen size 12 occurances 1/5,083.33 1920x947x24

lol didn't know that was a button :^)

As someone who wrote a paper on fingerprinting, here are some tips:
>spoof your user agent to something common that other browsers use
>Do not install any custom fonts on your computer. Note that some programs come with custom fonts, so you have to avoid those programs too.
>Use a standard screen resolution like 1920x1080 and run your browser in fullscreen. If you don't have this resolution, run in a common window mode resolution
>block the html element, there are add-ons for this
>remove all browser plugins (adobe flash and so on)
>use a common operating system like Windows 7 64-bit, there are many ways for a website to detect this
>live in a common timezone or change your OS timezone to one
>disabling cookies can help but doesn't do much
>disable javascript wherever possible
Best case:
>set up a virtual machine with Win 7 x64 or Win 10 x64 and a common screen resolution, install Tor Browser and set the security setting to max, never log into any website, only use window mode with default size, never use the VM for anything else
However, even the above can be detected, if they tried hard enough.

>browserprint.info

Attached: Browserprint 2-5-2019, 4-44-45 PM.png (650x171, 14K)

>browserprint

Aren't they literally just print out all the metadata, that your browser sends ?
Just use anti-tracking extensions, which basically stop you from sending all that.

a lot of those extensions can make your browser more unique since they may not be commonly used

Non unique is a meme, just make sure the signature changes on every page load.

>using firefox

Attached: 1546422360208.jpg (600x600, 36K)

>proceeds to put you in a cianigger database
> jej nothing personel kidd

Attached: 1541873492413_0.jpg (320x251, 20K)

use TOR browser settings.

Only way to prevent fingerprinting is to use Tor or Firefox in Tor mode (i.e. resistFingerprinting).

Anything else is either placebo (fingerprint add-ons) or actually harmful and makes you more unique (Brave)

>fingerprint me!
>browserprint.info/captcha
lol, yeah, no.

If you use Firefox and say I a chrome this will make you more unique bc websites can deduce what browser you use. If you use Chromium you lost anyway.
If you disable JS you instantly will be unique. There are many vectors that can be fetched without js. Imagine how many people globally have JS disable.

As the other guy said only Firefox with resistFp enabled or Tor itself can prevent this.

>Year after year Richard "I browse through a wget daemon" Stallman sounds less and less crazy.

Why not?

Attached: 2019-02-05-224142_620x285_scrot.png (620x285, 36K)

heh

Attached: 1533979690932.png (593x134, 19K)

>your browser fingerprint appears to be unique...we believe you're using IE
deletes cookies and cache
>your browser fingerprint appears to be unique...we believe you're using Firefox
Hmm...

Me too, both times.

Attached: wat.png (793x516, 77K)

>did a research paper
>suggests using honeypot us navy designed successful social engineering project
As someone who is a network security consultant, I disregard anyone online who opens with the line “as someone who is an [occupation]” since anyone can write anything they want

Neat.

//browserprint.info/view?source1=UUID&UUID1UUID=776753c8-a9f5-4111-a648-63540dbe639f

Attached: Screenshot from 2019-02-05 20-00-00.png (862x162, 32K)

Whether it's true or not is irrelevant because the OP asked how to get a non-unique fingerprint and that's what I responded to.
And yes, writing a paper doesn't mean credibility, it just means I've done days of research on the topic unlike most of Jow Forums who might have done a 5 minute google search.

>install flash

wdf is this.

>choose your os
>templeos
>the os with no networking
ffs

don't try to be non-unique. Just make sure your fingerprint changes. There's a reason UA-spoofing addons and such have a "pick a random one every X minutes" mode.