One of the most pervasive ways of being tracked online is also the most invisible. VPNs, browsers, extensions, and more all promise to protect you, but can they really?
Invidious link: https://invidious.nerdvpn.de/watch?v=tMCcpV2c4K4
Check your exposure and how to limit it:
https://coveryourtracks.eff.org/
https://canvasblocker.kkapsner.de/test/test.html
And more at:
https://librewolf.net/docs/testing/
Not all browsers are the same.
Correction:
deleted by creator
Some test sites are definitely not for the uninitiated.
Browserleaks is the least complicated advanced ones so I’ll go with that.
Browserleaks has a little thing at the bottom of each one where you can read more about what the tests are.
Basically, the idea for some of them is to be able to hide(spoof) the information about your device, your software, and anything else that might make you stick out from others.
IP is straightforward. But your connection can be fingerprinted based on some criteria. Not a major issue unless you’re using something weird.
Webrtc can leak your IP even behind a VPN/proxy, along with your hardware specifics.
Webgl can expose your graphics hardware, vendor, and other metrics.
Webrtc and Webgl, I have disabled on everything.
Canvas is how your display/graphics computes. It can have very small variances even in the same GPU on different devices, and when rendering can create uniquely identifying characteristics.
The java script test just shows what java script can sea, some of which can be spoofed using settings or addons. Or by disabling JavaScript.
I use fingerprint resistance in Firefox, and canvas blocker add-on on mobile to reduce uniquely identifying information.
And always ublock origin.
Mull has all the privacy settings enabled and added by default.
deleted by creator