alternative_right shares a report from 404 Media: An independent privacy audit of Microsoft, Meta, and Google web traffic in California found that the companies may be violating state regulations and racking up billions in fines. According to the audit from privacy search engine webXray, 55 percent ...
Honestly. I think if tracking is disabled it should do the following:
Like there are many steps that can be done to help mitigate fingerprinting, its just getting vendors to actually do it.
being said I had never known about the TLS fingerprinting option, I generally don’t see that shown on the fingerprint detector sites, that’s interesting.
There’s also things like the SNI field which is a non-encrypted field which contains the requested domain name. Even if you use DNS over HTTPS to keep your information from leaking via ISP controlled DNS servers, they can still get the destination domain names from the SNI during the TLS handshake.
Good ideas… and yeah… the browser vendors have a financial incentive to build mechanisms to collect anything and everything. Javascript itself exposes so much more fingerprinting possibilies.
That’s also why I think it’s so terrible for Google’s Chrome to have like practically all the market share. G can now drive the whole web in a way that’s good for them and bad for us.