Abstract

Browser fingerprinting is a growing technique for identifying and tracking users online without traditional methods like cookies. This paper gives an overview by examining the various fingerprinting techniques and analyzes the entropy and uniqueness of the collected data. The analysis highlights that browser fingerprinting poses a complex challenge from both technical and privacy perspectives, as users often have no control over the collection and use of their data. In addition, it raises significant privacy concerns as users are often tracked without their knowledge or consent.

Methods of Browser Fingerprinting

  • A. HTTP Header Attributes
  • B. Enumeration of Browser Plugins
  • C. Canvas Fingerprinting
  • D. WebGL Fingerprinting
  • E. Audio Fingerprinting
  • F. Font Fingerprinting
  • G. Screen Fingerprinting
  • H. WebRTC Fingerprinting
  • I. CSS Fingerprinting
  • J. Additional JavaScript Attributes
  • K. Advanced Techniques Using Machine Learning
  • lurch (he/him)@sh.itjust.works
    link
    fedilink
    arrow-up
    1
    ·
    4 days ago

    but you don’t know how clean it is.

    it will never be completely useless tho. it just means all tor browser users who use this window size will get the same ads. for advertisers it’s still better than not knowing anything. they know there’s a group of people and some of them are into dragon dildos and some like to buy used underwear for example and then everyone in the group gets related ads if an advertiser decides to use it.

    • lad@programming.dev
      link
      fedilink
      English
      arrow-up
      2
      ·
      3 days ago

      Personally, I’m okay with getting average ads, the less targeted ads are, the less chance it will have any effect. If course, it’s better to use blocker to not see ads at all, but I don’t always use it