From 008d01d4d0d8037d7f101bea79c37160091eedf8 Mon Sep 17 00:00:00 2001 From: Thorin-Oakenpants Date: Sun, 24 Jul 2022 16:45:44 +0000 Subject: [PATCH] Updated 3.3 Overrides [To RFP or Not] (markdown) --- 3.3-Overrides-[To-RFP-or-Not].md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/3.3-Overrides-[To-RFP-or-Not].md b/3.3-Overrides-[To-RFP-or-Not].md index 6e1afec..11fe118 100644 --- a/3.3-Overrides-[To-RFP-or-Not].md +++ b/3.3-Overrides-[To-RFP-or-Not].md @@ -84,7 +84,7 @@ Due to it's nature, which is effectively breaking web standards whilst protectin If you can live with that, and you should have a secondary browser for the occasional site glitch, then use RFP as the best solution possible. Otherwise, if you think the threat fits your wheelhouse, use CanvasBlocker with canvas and audio randomizing (the rest is not really needed and will add perf costs). Note that extensions lack APIs to fully protect metrics, but naive scripts are likely not that sophisticated. -1 Assuming it is even fingerprinting and widespread, this does not compromise your fingerprint - it is a single metric and only on those sites you exempt. +1 Assuming it is even fingerprinting and the _exact same canvas test_ is widespread, this does not compromise your fingerprint - it is a single metric and only on those sites you exempt. ---