Is this the holy trinity of privacy browser extensions?

Is this the holy trinity of privacy browser extensions?

Attached: Capture.png (320x156, 21K)

Other urls found in this thread:

github.com/StevenBlack/hosts
addons.mozilla.org/en-US/firefox/addon/resist-fingerprinting/
twitter.com/AnonBabble

>uBlock Origin
>SmartHTTPS
>Decentraleyes

Replace Privacy Badger with uMatrix. Personally I also lean towards Smart HTTPS.

privacy badger is superfluous with UBO, presuming you remember to enable the extra filter lists.

More like autism extensions

uBlock is actually all you need

What about noscript?

strictly inferior to uMatrix

Do I have to install 12 different fucking extensions just so I don't get tracked these days, fuck this gay earth.

Attached: download.jpg (300x168, 10K)

Yep. There's also over a hundred things in about:config that you'll want to change.

Don't forget your hosts file.

github.com/StevenBlack/hosts

>HTTPS everywhere
what's even the point of using it? browsers nowdays always default to HTTPS
also
>Privacy Badger
same as UBO. just get umatrix for extra experience

You also need a custom user.js

plus remember to change the following settings in firefox (or any relatively up-to-date fork thereof):

network.security.esni.enabled to true

and

network.trr.mode to 2

this isn't really necessary if you're using a router that supports dns over tls, or are running dnscrypt on your machine though. but for the lazy, this is a whole lot better than nothing.

what about privacy possum?

Fpbp

uBlock, ReloadMagic, Ebates, and HTTPs (just in case).

Chameleon, Ublock Origin, Canvas

>holy trinity of privacy extension
>makes you easier to track
Are you some kind of retarded? The only way to be private non ironically is to remove all add-ons and use Firefox with some about:config flags toggled (especially resistFingerprinting and firstparty isolate).

Any addon you use can be deduced by its behaviour through Javascript. Now imagine how many people use your "holy trinity" worldwide, even worse PrivacyBadger makes unique lists for everyone so it actually makes it easier for you to be tracked.

Any single add-on you install makes it easier for you to be tracked I am dead serious.

People on g call others math brainlets but apparently not a single person on here understands entropy in the context of information theory.

Again this makes you easier to be tracked since websites can see this behaviour and now imagine how many people have toggled those in addition to your unique fingerprint?

People here seem to have no clue about web privacy it is beyond saddening. Every single one of you have every link you ever clicked on for free to Google cloudflare and facebook.

that's also why Browsers like Ungoogled Chromium Brave Vivaldi Icecat Waterfox or Palemoon are worse for privacy than Chrome itself.

Useless since it can't spoof many values and websites can request the browser to disable the add-on (yes read security js. api)

The only way to prevent from fingerprinting entirely is using Tor browser or Firefox setup identical to Tor (which clearly none of you brainlets are able to)

Why use uMatrix when uBlockOrigin does the same things and more?

Tor browser comes with ublock origin and it's better to leave defaults except you should disable all js using that network.
I whitelist js per domain on clearnet.

Then why do I score better with certain extensions and about:config settings changed on fingerprinting tests?

Because he's an idiot and doesn't understand what he's talking about

>Again this makes you easier to be tracked...

ESNI and trusted recursive resolvers do not make it easier for you to be tracked and identified. Also, cloudflare has a way better privacy policy than google and facebook. Also also, ESNI and TRR make it a good deal harder for your ISP to collect data about you, something which is very desirable for people on abusive ISPs like comcast / xfinity.

Furthermore, DNS over TLS, when implemented on the router side (as opposed to using firefox's new-ish settings) is fucking fantastic, because *all data* is encrypted. DNScrypt is a great option for those who don't like cloudflare though, and OpenNIC supports it on some servers.

Basically, you don't know what you're talking about. There's a lot more to security and privacy than what browser you use.

and don't forget that cloudflare has only taken down one site in their entire history: daily stormer. google and facebook take down thousands of peoples' content on the daily. cloudflare also enables us to chat about our autism on these shitty messageboards.

Is this because of browser fingerprint or something else?

Tor uses ublock origin. You should use ublock origin. As well as privacy.resistFingerprinting;true
privacy.firstparty.isolate;true and other about:config settings when you can. If you need to use captcha than you might not want resistFingerprinting enabled because it makes it a bitch. But try different fingereprinting tests with those settings enabled and disable and see for yourself.

i can be autistic in what 3rd party domains i want and what type of things i get from their domains while changeing these things on the fly

>fingerprint tests

You should examine the code of panoprtoclick and the like. they check five our of 10000 properties.

Most websites are already using https, why even bother?

They don't. go download tor now compare the signature them come back saying they use ublocl. Tor does in fact use noscript bc that one doesn't havE unique lists like ublock.

He is correct though.
Read effs and tors explanation of how entropy in information theory works.

You want to look like everybody else (i.e. Tor) not like that one privacy dmguy with 10 add-ons. There are many whitepapers how this works just read one. Everyone has to go through the realization of having given their entire psychodemographic profile to Google for free at one point. The only question is whether you want to continue or stop it.

Privacy Badger breaks 4ChanX's No-JS Captcha, so it's shit.
HTTPS Everywhere only works on a whitelist format, so it sucks balls too.

>what's even the point of using it? browsers nowdays always default to HTTPS
4Channel doesn't unless you have the option checked in the native extension or in 4ChanX's configuration if you use it. Just saying.

Then again, HTTPS Everywhere is shit. Smart HTTPS is the patrician choice.

let me guess panopticlick and amiunique yea? Those are beyond terrible. Goto browserleaks.com look at your values and keep in mind that commercial fingerprinters do at least one thousand times more fingerprinting.

this, ublock origin and delete cookies on exit (or cookies auto delete addon)

>can't decide whether this post is psyops by shills or just retarded.
Let a hope it is really good psyops and not actually you thinking some random public fingerprinting code determines your ability to be tracked or not. If you are genuinely that retarded read into information theory. The eff has a nice article on it.

good

Tor doesn't use ublock though they even explained multiple times that it makes you easier to track because of its non determinism. Go check the signature of the file you downloaded if you non ironically have a tor variant with ublock it definitely is not official.

The only add-on tor is distributed with ever is nosxript. There are endless issues on their bug tracker to include ublock and every single one of.It is closed. look it up yourself.

Privacy Badger is very outdated. Privacy Possum does is much better at the same job.

You are aware that using it is visible to a website? The only way to spoof a fingerprint is to enable resistFingerprinting in Firefox or just use Tor (which q also enables resistFingerprinting with additional hardening flags)

Also privacy badger isn't outdated it just again makes you easier to be tracked because everyone has unique lists. And with javascript I can easily check which hosts you block and which don't.

And if you don't have js enabled you first wouldn't need all those plugins anyway (although they are still placebo) second you could still get tracked and fingerprinted through css and cache,etags etc etc.

It is astonishing how little people actually know about tracking it really hurts.
People here cry about everyone being a math brainlet but nobody seems to.know how entropy works in an information technology context. pathetic.

Many sites still don't enforce https, and even if they do, there's a chance that some page elements are not being TLSed.

>being this retarded
Dude don't worry Google and Cloudflarr already know every single thing about you and every single link you ever clicked on and will continue to do so since you obviously are retarded.

Tails ships with uBlock. I'm pretty sure Tor also ships with HTTPS Everywhere (and the Tor button but that doesn't count)

By using https everywhere you protect yourself from someone snooping on your network (i.e. in close.geographic region) though only for a tiny number of webpages (certificates are literally free now days) but at the same time allow Google to uniquely recognize you every single time you click on any link. I wonder what's worth more.

>one us company with government ties has better privacy than the other
Are you retarded? Let me guess you non ironically use 1.1.1.1 don't you?

Tor ships with https everywhere because everyone has it then and https everywhere itself is deterministic. Ublock is not though and the Tor devs have said this every single time and closed every issue suggesting ublock.

If tails is non ironically using ublock for its tor browser (not the regular browser) then.This is a huge breach of.privacy. If you don't believe me go to.tors bug tracker and just search for ublock.

Any and all browser extensions not named HTTPS Everywhere or NoScript are anti-privacy. The only private browsers are Firefox configured like TOR and TOR itself. That said, if you're not connected to TOR/i2p/etc., you don't care about privacy of what you're doing anyway and since you're using a site that bans VPNs and TOR you should not be using Jow Forums with privacy in mind. Just get uBlock and Decentraleyes to make your browsing slightly slightly quicker, but don't think for a fucking second that you're private. Because you're not. And until you change to a privacy focused network, you never will be. All those privacy extensions don't do anything besides make your life slightly less convenient because they break features.
Don't hosts block things either.

>browserleaks.com
Not the user you replied to, but thanks dude. That page and the comment boxes on the different tests introduced me to the Chameleon and BP Privacy Block All Font and Glyph Detection addons. They look pretty handy.

Say, how fucked am I if the only single area where I failed is the CSS3 Media Queries?
It's just stuff like the resolution of my screen and some Mozilla related variables.

If there is a SINGLE point where you do not blend in perfectly, you are giving away your entire browsing history to the NSA, Google, and Cloudflare. The end. You cannot spoof all the fingerprinting to remain secure and still blend in. The ONLY option is TOR for privacy.

good for pre 57
ubo for post 57

>The internet is so fucked now that all the privacy solutions you can try have some sort of fatal flaw
Can GNUnet hurry the fuck up, I want off this ride

Attached: 1526754066560.jpg (750x903, 72K)

It doesn't.
It doesn't at all

>Tor browser comes with ublock origin
But it doesn't

They actually work together like peanut butter and jelly. uMatrix allows you more control over specific types of things you want to allow and disallow.

I wish it did :(

This is actually all you'll ever need

Attached: DI3QUyCVoAAUIfi.png (1200x675, 657K)

More
Icecat is just Firefox ESR with nonfree branding images replaced by CC ones and some basic about:config tweaks to prevent unsolicited browser requests, how is that a dramatic privacy reduction? It's not a hard fork like the rest you mention.

The final redpill is to use multiple browsers and then using each one for things mutually exclusive from the others

>people talk about defending against fingerprinting and session cookies
>posts a browser whose developers state it can't protect against either properly and you should use Tor if you are concerned over privacy

I am not kidding read their own faq. Also I thought it was common knowledge by now that Chromium based browsers literally succumb to one or the other. Even if you'd manage to implement complete fingerprint protection in a Chromium browser (which you cannot read Google's and Tors explanation) you'd still be vulnerable to supercookies which Brave explicitly says are not avoidable if you use anything but Firefox / Tor.

Not him but Icecat is ESR as you pointed out greatly reducing the amount of power it takes to uniquely identify you (imagine how many non Tor ESR Firefox users are eorldwide, and yes you can deduce versions easily through behaviour).

Also Icecat handles some connection differently than lets say Firefox 66 which again can be deduced by a website through Javascript.

Also if you use any Firefox fork there is no reason not to use Firefox itself. Mozilla has a wiki entry on how to permanently disable all telemetry and by using by using recent Firefox you get even more fingerprinting protection (for example Letterboxing just arrived in 66 which no browser has besides obviously Tor)

this, both https Everywhere and Privacy Badger are garbage/useless

Brave is worse than all the other Chromium forks because it says built in adblocjer while explicitly whitelisting Google Facebook and Twitter trackers and no blocking them doesn't break anything Firefox blocks them by default and nothing breaks not even Google Facebook or Twitter themselves

It does though, advanced uBlock O has the same options.
uBlock is default allow though while uMatrix is default deny.

Why not use brave then?

There are literally 5 posts above you that explain why not to use Brave (including their own devs acknowledging that a Chromium.based browser cannot defend against fingerprinting or supercookies) yet you still ask why not to use Brave?

Tell your boss Brendan to make you better at shilling. Also get your 5 rupees out of his sjw pink haired trannies """"security analyst""""

Privacy wise, what would be the best browser/extensions setup then?

No extensions at all default Firefox with some config toggled. Though since you clearly are a brainlet you would instantly fail in configuring Firefox properly just use Tor. As soon as you make one mistake or overlook one single value configuring Firefox (out of at least like 50) you will make your entire browsing available to Google.

tldr use Tor or don't care about privacy. Any add-on you use makes you easier to be tracked since it isn't default setup. And any browser besides Tor will make data leak meaning even without any add-ons you still will be tracked.

To add on that, disabling Javascript on Jow Forums(nel) actually makes captchas much easier, making the site perfectly compatible and convenient to use with resistfingerprinting.
For other sites, you want the extension that allows you to reenable it with a click in case you need to solve a recaptcha.

addons.mozilla.org/en-US/firefox/addon/resist-fingerprinting/
here

Just use canvas blocker. It fakes data by default

>privacy badger instead of privacy possum
>https everywhere instead of smart https
try harder

Reminder that browser extensions are inherently dangerous and a ticking time bomb. The more you have, the higher the risk.

>Ublock origin
>https everywhere
>decentraleyes
>Canvas blocker

Because uMatrix is more convinient than advanced mode uBlock Origin.

It does when you use Tails.

Privacy badger is useless when you have uBlockOrigin or anti-fingerprinting enabled.

uBlockOrigin only blocks scripts, domains and frames. uMatrix also blocks other shit like cookies, media and images afaik.

Tor Browser
customised IceCat/customized Firefox + uBlockOrigin

Canvas blocker is useless. A single about:config toggle already does it's job.

Browser fingerprinting means nothing if you allow more conventional means of tracking.
And please don't point to FF's in-built tracker blocker, because those disconnect.me lists are far from being perfect and the DNT header that it activates automatically also makes you stand out more.

Wouldn't Decentraleyes be a bit overkill if I'm already running uBO, uMatrix, and HTTPS Everywhere?

I just use uBlock Origin. Anything else is autistic.

Just install icecat lmao

It defaults to https but still allows http, I we want forced https

Smart HTTPS is better and Privacy Badger is snake oil. Use uMatrix.

>Any addon you use can be deduced by its behaviour through Javascript.
Do you actually have JS enabled?

One too many, retard.
I don't support TDS, but they shouldn't be shut down just because of their opinions.

this without umatrix web is literally unusable because every webdev monkey retard is abusing cpu resources to the maximum

you need to be extremely strict these days what a sad state of things

SmartHTTPS is a botnet.
>last updated Aug 31, 2018
>last commit on git May 29, 2018
I wonder why

The fact remains, I score better with resisFingerprinting enabled. Suck it.

Unlike https everywhere, smart https doesn't use a predefined list of websites that needs to be updated in order for the extension to work. So if the site you visit isnt on the list than https everywhere wont revert you to use ssl. Smart https will always try reverting to https.
Has the http and https protocol changed lately that warrants an update for smart https? I dont think so.

Breh, learn to read

Be grateful that those kind of extensions exist in the first place.

>privacybadgerbadgerbadgerbadgerbadgerbadgerbadgerbadgerbadgerbadgerbadgerbadger

Attached: BadgerBadgerBadgerBadgerBadgerBadgerBadgerBadgerBadger.jpg (720x478, 81K)

I prefer privacy raccoon or privacy bandicoot.

The daily stormer were saying things that were untrue about cloudflare. Thats where they fucked up.

I agree, same with stormfront.
Fools cannot gain wisdom if their society makes them silent.

MUUUUUUSHROOM
MUUUUUUSHROOM

SNAAAAAAAAAAAAAAAAKE OH SNAAAAAAAAAAAAAAAAAKE OOOOOOOOOOOOOOH ITS A SNAAAAAAAAAAAAAAAAKE

>Privacy Badger are garbage/useless
Why would you say that?