You are not logged in.
Pages: 1
Actually Panopticlick-style tracking is really really really100x oldschool. Theres many new known and unknown fingerprint style being used, especially by big company like google. I have many clients who experienced opening adwords account then for whatever reason their account is banned for life by google, then they open new account by using all new identity (brand new unrelated browser, new credit card identity with different name, new address, new internet connection, the only difference is using same computer), you know what happend? couple days later this brand new account banned because they know it is old user that they banned before. Sometimes I dont know how can they find out, but as far as I know this guys is really really good when fingerprinting everysingle user they have. the only failproof solution is also using completely new computer or using new virtual computer using VPN provider.
known new fingerprinting method for example like canvas html5:
1. check your fingerprint ID here & copy it to notepad:
browserleaks . com / canvas
2. Do whatever you can to delete your trace (dom storage, html5 storage, cookie, flash cookie, reinstall browser)
3. check your fingerprint once more from above sites. 99% it will still be same!
even most privacy browser cant pass this oldschool test:
fingerprint.pet-portal.eu
maybe epic browser should randomizing some browser data per browser session?
if you want to learn more about other mms.cfg options:
adobe . ly/1nxEDBa
Thanks for the great resources, we'll check into them. Plugins are the main issue...javascript leaks are relatively smaller and we can solve those..plugins are a harder problem which is why TOR disables them.
We tried those recommendations from JoDoNym for the Flash settings, but they unfortunately didn't work.
We're working on this!
It it because by default epic browser using pepper flash instead of adobe flash (Google also wants to control the flash, to make sure that fonts and other data information can't be turn off), trust me google is really evil, everything single thing they made free, they make sure they can spy your data. I worked for private security company and dealing with this type of stuff everyday.
my recommendation, after setting your mms.cfg from that above resources, disable google pepper flash, just use adobe flash:
https://www.enounce.com/chrome-disable-pepperflash
more secure option: set flash content to "click to play"
why my real ip address still leaking if checked via flash?
check it here:
ip-check[dot]info (then click "start test!")
stayinvisible[dot]com
I dont think font list can be known by just flash. javascript, css, and java can also list all your fonts.
Some method to check your font list:
ip-check[dot]info/?lang=en (flash)
stayinvisible[dot]com/ (javascript)
lalit[dot]org/lab/javascript-css-font-detect/ (css)
browserspy[dot]dk/java.php (java)
if you want to block fingerprinting javascript file, here's the known list:
cosic.esat[dot]kuleuven[dot]be/fpdetective/images/res-JS.png
if you want to set flash not to leak your font list, here's how to do it:
anonymous-proxy-servers[dot]net/en/help/flash-applets.html
Pages: 1