Updated 3.3 Overrides [To RFP or Not] (markdown)

Thorin-Oakenpants 2022-01-30 11:54:36 +00:00
parent 3a5689c054
commit 3fe4867018

@ -16,7 +16,7 @@ If your threat model calls for anonymity and advanced fingerprinting protection,
---
🟪 FINGERPRINTING
#### 🟪 FINGERPRINTING
If you do nothing on desktop, you are already uniquely identifiable - screen, window and font metrics alone are probably enough - add timezone name, preferred languages, and several dozen other metrics and it is game over. [Here](https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/cross-browser-fingerprinting-os-and-hardware-level-features/) is a link to the results of a study done in 2016 showing a **_99.24%_** unique hit rate (and that is excluding IP addresses).
@ -44,7 +44,7 @@ Only Tor Browser can confidently address advanced scripts: enough metrics covere
---
🟪 ARKENFOX
#### 🟪 ARKENFOX
**_Arkenfox does not and never has, claimed to defeat advanced fingerprinting_** and does not care if a couple of prefs change stable metrics, because **_you are already unique_** - see the preceding section.
@ -64,7 +64,7 @@ So if a fingerprinting script should run, it would need to be universal or wides
---
🟪 RFP
#### 🟪 RFP
Due to it's nature, which is effectively breaking web standards whilst protecting 100+ metrics, RFP does cause the odd issue.