• Zerush@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    2 hours ago

    Only 50% correct in my case (similar to Browserleaks), correct the OS, Screenresolution, Country but wrong site, wrong even the ISP

  • Alas Poor Erinaceus@lemmy.ml
    link
    fedilink
    English
    arrow-up
    0
    ·
    7 hours ago

    How many points of identification are needed to positively ID you? Something like 35 IIRC according to Cover Your Tracks/EFF? Might be remembering wrong 🤔

  • quick_snail@feddit.nl
    link
    fedilink
    arrow-up
    0
    ·
    9 hours ago

    This volume requires JavaScript. That is part of the point — your browser is what is being read.

    Looks like I’m safe

  • piyuple@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    10 hours ago

    It shows me the time for Reykjavik after identifying the city and country correctly.

  • nixukty@lemmy.zip
    link
    fedilink
    arrow-up
    0
    ·
    16 hours ago

    Vibe coded af, how has nobody spotted this. The website swears the text was written by a human, and either they have contracted chronic GPT-virus or are an LLM

    edit: this is made by Rise Up Labs which is an ai psychosis company

      • jpeps@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        9 hours ago

        One clue to me is the “how many times you moved” statement. One actual human “move” is worth hundreds of what the site calls a move. A human would notice that but the reality of it means nothing to an AI.

        Secondly just the language used being quite dramatic but also generic.

        • Bane_Killgrind@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 hours ago

          You know it’s just counting the change in acceleration in your phone’s gyroscope chip or whichever it is. If you are typing something the phone “moves” twice with each swipe.

          This page is just putting numbers it’s collecting from your phone into a template paragraph.

      • nixukty@lemmy.zip
        link
        fedilink
        arrow-up
        0
        ·
        3 hours ago

        AI is quite good at web design now, but it still has a distinct style. Claude in particular LOVES to mix serif and monospace fonts. This isn’t necessarily a guarantee based on just that, but it did trigger my alarm bells.

        The second biggest thing is the language. LLMs absolutely SPAM slightly vague, short phrases separated by punctuation.

        The language on each data point also is pretty repetitive which implies either sub agents were called or the model was asked individually to write something about it in a specific tone.

        The final nail in the coffin was the company that made it, Rise up labs, which advertised all their AI software on their home page

  • plz1@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    16 hours ago

    “We know your IP address”. No kidding, that’s how IPv4 works, even if the browser wasn’t leaking offering it.

    • iglou@programming.dev
      link
      fedilink
      arrow-up
      0
      ·
      12 hours ago

      The point is not that they know your IP, but that even your IP already gives away information. That’s why they start with the information, rather than the IP being the source.

      This is not intended to be for people who understand how this works.

      And as someone else said, probably vibe coded.

      • Zerush@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        2 hours ago

        The public IP is irrelevant, only shows the IP of the server used by your ISP, which can be at the other side of the country. It can maybe identify the ISP, but not the user, less if a dynamic changing IP is used. The public IP is always leaked if you don’t use a VPN or the TOR network.

      • Bane_Killgrind@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 hours ago

        I understand how all of it works. Whether it’s vibe coded or not it, it showed me stuff that I didn’t think about like arbitrary web pages can know my phone tilt, battery level??

        The opsec implications are severe.

        • iglou@programming.dev
          link
          fedilink
          arrow-up
          0
          ·
          4 hours ago

          Oh yeah, it’s insane. The only way to truly protect your identity on the internet is by not using the internet. Second best would be tor, I suppose

    • Allero@lemmy.today
      link
      fedilink
      arrow-up
      0
      ·
      11 hours ago

      It seems to count a swipe as a series of dozens of movements. Probably to show there’s a clear fingerprint even in how exactly you move your finger.

      Websites don’t just get a “swipe” command. They know exactly where your finger is on the screen at any given moment.

  • DornerStan@lemmygrad.ml
    link
    fedilink
    arrow-up
    0
    ·
    18 hours ago

    It’s been a few years since I was invested in this topic, but I think the “meta” for reconciling the tension between blocking tracking and unique fingerprinting was to, in some cases, spoof information rather than outright block it.

    Tor browser does that by default, though a few years ago when I tried to use it as a daily driver it was too tedious thanks to cloudflare.

    Most of my research regarding browsers was focused on computers. Now that Firefox mobile can run extensions some of this might be mitigated that way.

    Blocking JavaScript unfortunately makes you super unique but the tradeoff is probably worth it imo. I don’t want every random site I visit to immediately run a bunch of code, especially third party nonsense. Even if it makes my traffic stand out.

    For most threat models I suspect unrestricted JavaScript is more dangerous than the potential for fingerprint-based tracking. Or at least JavaScript is very likely to leak multiple unique data points, whereas a “blocks JavaScript flag” is just a single unique identifier.

    Sandboxing and siloing can also mitigate some of the risk, and is relatively painless once implemented.

    All of it comes down to threat model and motivation. You can probably get like 70% better privacy/security for 20% of the work, which is a good standard for a typical usecase/person. Install ublock, disable some of the higher risk and less useful tracking (websites don’t need my fucking battery and gyroscope).

    Diminishing returns start to hit hard, in part due to the passive fingerprinting / active tracking tension, due to cloudflare, due to everyone around you that doesn’t give a shit. Anything on the other end of the risk spectrum should just be done without a smartphone in the vicinity, if possible.

  • Zacryon@feddit.org
    link
    fedilink
    arrow-up
    0
    ·
    18 hours ago

    Well then I am glad that it got most of it wrong. I don’t even put thaat much emphasis on fingerprinting countermeasures. Apparently, using Firefox in a private tab is enough.

  • RememberTheApollo_@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    19 hours ago

    I’m honestly not impressed. Basic IP address that didn’t really provide an accurate location, plus the (no shit sherlock) state and country it was in. Told me it was ios, a browser, and that I’d turned a bunch of stuff off.

    That’s it.