Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The EFF is right, this is still way too hard.


Actually it's a little harder still. For instance, when your browser makes requests in your behalf, it provides the destination server with a lot of information which can be used to identify you (at least temporarily)[1]. To get a better level of anonymity, one should at least use a combination of Tor and privoxy [2].

[1] https://panopticlick.eff.org/ [2] http://www.privoxy.org/


Your information is out of date. The Tor project no longer advises the use of privoxy, and advises all users to use The Tor Browser Bundle. This is specifically configured to make all Tor users look the same, precisely because of browser fingerprinting.


Thank you for the heads up. I didn't know that the Browser Bundle also took care of fingerprinting.


I could have sworn there was a "Show HN" which was a basic implementation of the Panopticlick browser fingerprinting, but I can't find it...




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: