Readit News logoReadit News
y-c-o-m-b · 3 months ago
I exclusively use private browsing, but I know that doesn't do much in preventing tracking, so it's nice to see this finally starting to roll out.

The fact that I have to go to great lengths to browse anonymously - and companies desperately try to circumvent my genuine decision to opt out of their tracking - tells me everything I need to know about those companies. Words like sleezy, shady, and predatory come to mind.

I would love to see this taken one step further and have states/countries prevent companies from tracking me altogether if I reject their cookies, but I fear it's more likely those companies will lobby to prevent Firefox from protecting us.

tlavoie · 3 months ago
The "Temporary Containers" extension is great here, allowing pretty easy compromise between different buckets of sites. I'll have some personal ones that I log into, others go specifically into a snoop container, and the rest get temporary ones that evaporate when closed. https://addons.mozilla.org/en-CA/firefox/addon/temporary-con...
modin · 3 months ago
stoically, the maintainer and creator of this extension unfortunately passed in early 2023. There's a new fork available[0], linked from github[1].

I briefly discussed this extension and how to proceed after the passing of a maintainer with Mozilla staff in their Extensions and People teams at FOSDEM this year, but there was no real procedures in place at the time of our chat.

[0]: https://addons.mozilla.org/en-GB/firefox/addon/temporary-con...

[1]: https://github.com/stoically/temporary-containers/issues/634

tgv · 3 months ago
You could try to use profiles instead of private browsing. It keeps things separated.
notafox · 3 months ago
Also profiles can be configured and used with CLI, no need for UI (old or new).

    ./firefox -CreateProfile "profile-name /home/user/.mozilla/firefox/profile-path/"
    ./firefox -profile "/home/user/.mozilla/firefox/profile-path/"
And, you can run it directly, no need to launch default firefox profile:

Given that /usr/bin/firefox is just a shell script, you can

    - create a copy of it, say, /usr/bin/firefox-hn
    - adjust the relevant line, adding the -profile argument
If you use an icon to run firefox (say, /usr/share/applications/firefox.desktop), you'll need to do copy/adjust line for the icon.

mihaaly · 3 months ago
I am dreaming for righteous 'small' employees too, those who carry out the dishonourable practice of implementing privacy intrusion following instructions, for money. Corporates are built by thousands of ignorant grey workers.
floxy · 3 months ago
Tor? Although I wish there was a way to make a reddit account.
godelski · 3 months ago
You might want to check out the Mullvad browser. They work with Tor and are based on Firefox. It won't connect you to the Tor network but still
DANmode · 3 months ago
Library
kalaksi · 3 months ago
> I would love to see this taken one step further and have states/countries prevent companies from tracking me altogether if I reject their cookies

You're in luck since EU's GDPR is about informing users of PII harvesting and consent in general (among other things). So the banner is not only about cookies. And I think nowadays there are similar regulations elsewhere.

drnick1 · 3 months ago
The last thing I want to see is more banners that don't actually do anything for your privacy. Let's be real, websites/companies will do whatever they want with your data, the banner is just for show.
recursive4 · 3 months ago
Out of curiousity, how would you steelman the argument that fingerprinting is no different than a store owner, standing behind the counter, taking note of the faces of who enters his store, and maintaining a log?
sudobash1 · 3 months ago
To make that analogy closer to the Internet reality, I would say that Internet tracking is more like a cabal of shop-keepers, librarians, neighbors, utility pole workers, and so on who are keeping track of all the faces, all their habits, what they look at, what they say, who they interact with, and share this information amongst themselves, recording it in perpetuity. They also share details with the police and anyone who cares to purchase them.

When you talk about a "shopkeeper" it gives it a small community charm. The Internet is anything but that.

MichaelNolan · 3 months ago
The difference is scale and intent. A mom and pop store owner “remembering” my face versus big tech tracking is like comparing a nosy neighbor to the CIA.

One of them might peer out their window, the other will infiltrate every aspect of your life. One of them is bored, the other has no qualms about doing significant harm to you if it serves their interests.

godelski · 3 months ago
I'm fairly confident I could sue that store owner for stalking if they were logging every time I entered that store and left, along with all my activities.

I'm absolutely positive I could if they were getting other store owners to help them track me.

What I don't understand is why this is unacceptable if they do it to a single person but perfectly normal if they do it to all their customers. IMO that should make things worse, not better.

Let's put it this way. You'd get a restraining order against someone if they followed you around all day, logging when you woke up, ate, who you talked with (even if they don't hear the conversation), where you went, and when you went to bed. That's clearly stalking, right? So why us it suddenly acceptable when it's being done by some guy named Mark who is stalking a billion people instead of just one?

We clearly differentiate this from being a regular customer at a store. If I'm a regular at Joe's Corner Market and get a sandwich every Wednesday for lunch then he remembers me because we're talking face to face and making conversation. It's personal. There's clear consent in what I'm sharing and there's a clear expectation that Joe isn't going to use that information to manipulate me or follow me around town. Our interaction is limited to the store and maybe bumping into each other on the street. It's clearly not stalking, we're just friendly. The same way your partner might know about when you wake up, go to sleep, eat for breakfast, and all that same stuff. Your partner isn't stalking you.

[Edit]: I want to encourage the above comments. Doesn't matter if recursive4 believes the other side or not, I want these conversations to be front and center. I like to see the other responses than mine as well and I think these help us refine our arguments and by being prominent they help others be convinced and join us. So while I know we don't usually talk about how to upvote/downvote, I'll just say "vote strategically rather than agreeability" :)

AstralStorm · 3 months ago
The store owner visibly responds to the customers differently. Fingerprinting is invisible. It's more like the store owner recording everyone on hidden camera.

So no, you cannot steelman a broken analogy.

glenstein · 3 months ago
It's automated data processing at scale rather than a local mom and pop country general store. The profit seeking, decision making, management culture driving decisions is a fundamentally different relationship. Also I don't think store owners do that?

Rather than presupposing an analogy to something importantly different, I would propose that the steelman would be along the lines of noting that ads and hyperpersonalization are effective at meeting and predicting your needs, and steering you towards an interpretation of your own needs that finds their fulfillment in deepening a consumer relationship. And if you get steered into lock-in with one company's ecosystem, you get the convenience of a stack of vertically integrated services.

abdullahkhalids · 3 months ago
Lots of moral values/legal rules are based on magnitudes and scale.

You can talk at a normal voice inside your own home at night, and even if the neighbor can hear you through the thin walls, they have no legal recourse. If you start blasting music, the police will (in principle) come and stop you.

Some things are okay in moderation and simply bad in excess.

DANmode · 3 months ago
Value of the dataset to attackers/buyers.
xnx · 3 months ago
This is a good use of Firefox resources. Unfortunately Firefox is at a natural disadvantage for fingerprinting by virtue of being used by such a small number of users.
port11 · 3 months ago
There was a commenter some time back showing that browser statistics were easy to skew. Safari and Firefox are less likely to show up in analytics, so website owners think they're less important than they really are. Conflating client-side with server-side analytics showed quite a gap.
kube-system · 3 months ago
Most of the people who are just looking at browser statistics for the purpose of managing a website are using simple tools that just simply collect data from user agent strings. Determining browser from this isn't 100% straightforward, but it's enough to give website operators a rough idea of what browser to target. This data was more important in the days when everything wasn't Chrome/Android/iOS, and it actually mattered what version of IE your users were running.

If you're doing fingerprinting for tracking purposes, you're gonna be tracking a lot more in-depth data.

But in the end, there are pretty much three types of Internet user today: 1. The person who uses the default browser installed on their device. 2. The user who always downloads Chrome when they first get a new computer. and 3. Nerds who do something else.

firefax · 3 months ago
>This is a good use of Firefox resources. Unfortunately Firefox is at a natural disadvantage for fingerprinting by virtue of being used by such a small number of users.

I'd rather be trackable but secure -- the big draw for me is NoScript. Paired with uBlock, I'm safe from malvertising[1]

[1] https://en.wikipedia.org/wiki/Malvertising#Examples_of_malic...

lone-cloud · 3 months ago
You're more trackable by using NoScipt and there's no good reason to use it if you know how to properly use uBlock: https://github.com/arkenfox/user.js/wiki/4.1-Extensions#-don... uBlock is a content blocker so it can do everything NoScript can if you learn its advanced UI usage. Using additional extensions makes you more trackable.
dorgo · 3 months ago
I was wondering why uBlock is not enough since you can block Javascript globally and re-enable per site. AI's answer:

Only things uBlock doesn’t replicate:

NoScript’s anti-XSS and anti-clickjacking heuristics (uBlock just blocks the sources, not sanitize payloads).

NoScript’s control over other active content types (e.g., WebGL, media codecs, etc).

NoboruWataya · 3 months ago
I often think about this in connection with my user agent. I am sure it helps identify me. If I spoofed a Chrome/Windows UA that would probably be better from a privacy perspective. But if we all do that then web designers will never know that we exist. I want people to know there are Firefox and Linux users out there.
kube-system · 3 months ago
Spoofed UAs are easily detected. And if you are spoofing your UA you are among a very small subset of users.
prism56 · 3 months ago
Interesting. So when you try resist fingerprinting. If you dont go all the way you're at risk of making your differentiations smaller?
kube-system · 3 months ago
As an oversimplified example:

If a website has 100 visitors, and 99 of them use Chrome, and 1 user uses Firefox, it doesn't matter how good their fingerprinting resistance is, they're always the one using Firefox.

https://xkcd.com/1105/

instagib · 3 months ago
One thing I found that broke tracking algorithms was the ‘every tab is a new random profile’ extension. I can’t remember the name as I haven’t used it in a while and it broke a lot of logins.

They could not build a profile on you and it would break their system of tracking user login per device.

DavideNL · 3 months ago
You probably mean Temporary Containers…?

https://addons.mozilla.org/en-US/firefox/addon/temporary-con...

rogueparitybit · 3 months ago
I've recently switched from Containerise + Temporary Containers to Auto Containers. Brand new addon, but the dev is responsive and IMO it works much better for creating new containers on the fly as you browse.

https://addons.mozilla.org/en-GB/firefox/addon/auto-containe...

https://github.com/Shajirr/FF-Auto-Containers

adamc · 3 months ago
Thanks to both of you. That seems valuable.
yborg · 3 months ago
In my case the single largest contributor to my fingerprint is ... canvas size. I run full screen with a custom Firefox setup that basically makes my canvas size unique :/ The "protection" Firefox uses for this is to always open a new window at a default size, which does nothing in my case since my toolbar config still makes the canvas size unique.

It would be really useful to have something that dithers the reported canvas size by 5 or 10 pixels in different containers to add noise there.

Liquix · 3 months ago
to defeat canvas size fingerprinting in firefox:

about:config -> set privacy.resistFingerprinting to true

about:config -> create new boolean key privacy.resistFingerprinting.letterboxing set to true

this will set your canvas to a common size which fits in the viewport and display a grey "letterbox" border in the surrounding space.

yborg · 3 months ago
Doesn't seem to work... reported canvas size is still some odd value (2200x1283x24). I think it uses a fixed size for the letterbox, which is useless. Right general idea though.
HackerThemAll · 3 months ago
Now I understand why I'm getting paywall limits even in private browsing :) I use Tree Style Tab, so my canvas is also of unusual size and ratio. I guess I can try making it more narrow or wider to combat that :)
pona-a · 3 months ago
I wish them the best. When I last tested it on fingerprint.com, the hash remained stable even with resistFingerprinting and letterboxing from a VPN, only changing between profiles. When I daily-drove resistFingerprinting (not reduceFingerprinting that permits exceptions like dark mode) in 2021, my hash changed every restart.
Tmpod · 3 months ago
Perhaps fingerprint.com has stepped up their detection game and have new heuristics to identify you, thwarting the resistFingerprinting measures.

My experience lately has been that fingerprint.com is able to identify my main profile "in bursts", i.e. it will identify me consistently for some days, then it will forget and tell me it's never seen me. Maybe the service they provide on the landing page has a TTL policy? Either way, I've observed this behaviour on both my main profile and my "Firefox Focus"-like profile (a mix of no history + automatic temporary containers). On Mullvad Browser, however, it always seems to group me with random access across the globe.

nicce · 3 months ago
Unfortunately, Cloudflare and other protections will keep working even less than they used to. I have started to not use Cloudflare protected websites because they don’t work with Firefox. But that is a fight I am going to lose.
harshreality · 3 months ago
Symptoms? Is it limited to when a site has Cloudflare's more aggressive protection turned on? I haven't noticed any problems I've attributed to Cloudflare, and I use Firefox exclusively.
nicce · 3 months ago
The only symptom is that captcha never completes.

I have more restrictive protections on. If you use just loose settings, it completes, but advanced fingerprint protection, for example, breaks captcha completion.

This is very known issue.

https://news.ycombinator.com/item?id=35742606

CWuestefeld · 3 months ago
This matches my experience as well. As a FF user, I very occasionally encounter problems, but these don't seem to be correlated to their using CF protections. Much more often I find sites broken that rely on cloud domains with bad reputations, which my DNS filters block.

I was actually wondering if the stuff that Mozilla's talking about here will be used by bad bot people to try to circumvent CF's abuse protections. As I recall from when I was working with them, CF's service relies in part on being able to identify botnet attacks by doing its own fingerprinting.

baranul · 3 months ago
Cloudflare and their crappy widget has done a disservice to the Internet and humanity. They really do need to come up with something else.
Spunkie · 3 months ago
I run exclusively Firefox over known mullvad VPN endpoints and I never have any issues with cloudflare or its captcha.
nicce · 3 months ago
I guess you don’t have fingerprint resist on:

https://news.ycombinator.com/item?id=35742606

jrochkind1 · 3 months ago
I'm sorry whatever problem you've run into, but it's definitely not true that no cloudflare protected websites work with any Firefox. You've run into something more specific, I guess.
jrochkind1 · 3 months ago
This seem sto be the actual list of things it's protecting?

https://support.mozilla.org/en-US/kb/firefox-protection-agai...

They are... surprising to me. And as a developer, some of them seem kind of horrible. Altering canvas data, really?

hmry · 3 months ago
It's a real "can't have nice things" situation.
cluckindan · 3 months ago
It’s a bit annoying that Firefox by default breaks all sites that use canvas imageData API. There is no permission for that, so no user-friendly way to ask for consent either.
HackerThemAll · 3 months ago
Sites such as?
cluckindan · 3 months ago
Offline friendly image editors for instance.