From 52d942e16ded89cf3d7e2b87083da1fd88bf8aa9 Mon Sep 17 00:00:00 2001 From: Thorin-Oakenpants Date: Sun, 30 Jan 2022 12:34:30 +0000 Subject: [PATCH] Updated 4.1 Extensions (markdown) --- 4.1-Extensions.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/4.1-Extensions.md b/4.1-Extensions.md index 16f4631..b377d3b 100644 --- a/4.1-Extensions.md +++ b/4.1-Extensions.md @@ -71,9 +71,8 @@ These extensions will not mask or alter any data sent or received, but may be us - ❗️Sanitizing in-session is a false sense of privacy. They do nothing for IP tracking. Even Tor Browser does not sanitize in-session e.g. when you request a new circuit. A new ID requires _both_ full sanitizing _and_ a new IP. The same applies to Firefox - ❗️Cookie extensions lack [APIs](https://bugzilla.mozilla.org/1669716) to work with Total Cookie Protection which [will be the default](https://bugzilla.mozilla.org/1731713) * Anti-Fingerprinting Extensions - - Redundant with RFP: We enable RFP by default as the [best solution](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-[To-RFP-or-Not]) - - Robust, built-in, performant, extra timing mitigations, and doesn't leak - - ⭐ If you don't use RFP, then we recommend Canvas Blocker (see above) as your best option + - Redundant with RFP which is the [best solution](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-[To-RFP-or-Not]) + - ⭐ For non-RFP users, we recommend Canvas Blocker (see above) as your best option - Most extensions cannot protect what they claim: - It's impossible (engine, OS, version) - It's not a lie (the sites expect and use a valid value)