Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Another compelling reason to have JS disabled by default. If you need to browse those sites listed on the page, consider having a dedicated laptop that would have a specific fingerprint separate from the machine you would do most of your daily browsing on, and compartment away those sites that are known to track you across the web.

I actually rarely have to enable JS on pages now. Most JS-only sites can be find in places like https://news.ycombinator.com/show where people showcase JS-only sites / apps. Most are innocuous enough and are not trying to track you though, so I sometimes turn on JS just to test them out. I have a dedicated laptop for Youtube, Reddit etc. I'm well aware that sites like Reddit track you via JS, so I compartment / silo sites like that with a dedicated machine.



Disabling JS does nothing when you can do network level fingerprinting.


> when you can do network level fingerprinting

Which can be addressed with a VPN. By insulating an IP away from other IPs you can stop IP correlation.


Network level fingerprinting has nothing to do with IPs. It works by using protocol artifacts.

But VPN do migrate the problem.


I Googled it and I found these two articles that touch on it briefly:

https://www.researchgate.net/figure/Network-level-DNS-Finger...

https://securitytrails.com/blog/cybersecurity-fingerprinting

Is this the kind of tactic you mean?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: