dEEpEst Posted December 19, 2017 Share Posted December 19, 2017 [ATTACH=JSON]{"data-align":"none","data-size":"full","title":"World-Internet.jpg","data-attachmentid":110675}[/ATTACH] When visiting a site, we leave a lot of data about ourselves, starting with the IP address and ending with the digital prints, which are formed from all available data about the system, the browser and plug-ins. These fingerprints are called "fingerprints". They are unique identifiers of 32 characters, and are formed on the basis of several types of data: language settings, fonts installed in the system, time zone, browser plug-ins, screen resolution, etc. It is thus possible to identify a specific user by simply comparing the prints , received by the site. In this case, changing the IP address does not affect the fingerprint in any way! Approximately 90% of all browsers are unique! And the only thing we can do is get to the largest possible category. If you have a standard browser, no extensions, etc., then you will be identical to about 800 thousand users! Each next add-on makes you more unique. For example, installing the NoScript plug-in reduces the uniqueness by 50%. The Tor browser hides all the information about the system, but it gives the opposite result and allocates the user among the others, although it provides a minimum of information to the sites. For example, when JS is on, the site can see your screen resolution (you may have seen a warning appear in the browser itself, open full screen). Here is the list of the main prints : • Canvas fingerprint - obtained using JavaScript. Different systems and browsers draw images differently. On the basis of this, a unique imprint is formed; • Screen Size and Color Depth - screen resolution; • Browser Plugin Details - information about installed plug-ins; • Time Zone; • ETag - identifier, which is formed from the contents of the browser cache; • Language - the language of the system; • Hash of WebGL fingerprint - information about the 3-D chart. Contains information about the video card and so on; • Font Fingerprints-fonts installed in the system; • WebRTC Leak Test - unique identifiers of all audio and video devices in the system; How to protect yourself from identification? • Disable JavaScript (we immediately remove the prints of Canvas, WebTRC); • Disable the saving of cookies and cache; • To change information about the browser, for example, there is a plug-in Random Agent Spoofer; • Use a clean browser, with no extra add-ons. Sites where you can see your prints : [HIDE-THANKS]http: //ipleak.com/ https: //browserleaks.com/ https: //whoer.net/ https: //panopticlick.eff.org/[/HIDE-THANKS] Link to comment Share on other sites More sharing options...
Recommended Posts