From 6804eab410ee5342225aa1cb8a89645b8f48dfe1 Mon Sep 17 00:00:00 2001 From: Thorin-Oakenpants Date: Sun, 30 Jan 2022 13:38:01 +0000 Subject: [PATCH] Updated 3.3 Overrides [To RFP or Not] (markdown) --- 3.3-Overrides-[To-RFP-or-Not].md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/3.3-Overrides-[To-RFP-or-Not].md b/3.3-Overrides-[To-RFP-or-Not].md index 5357127..4c31d2f 100644 --- a/3.3-Overrides-[To-RFP-or-Not].md +++ b/3.3-Overrides-[To-RFP-or-Not].md @@ -1,6 +1,8 @@ 🟩 Previous: [Overrides [Common]](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) -🟥 Summary: **The best any browser can confidently do, excluding Tor Browser, is fool naive scripts. In Firefox the best tool for that is RFP - it is performant, does not leak real values, and has timing mitigations against side channel attacks**. If you can handle a few RFP side-effects, cool - if not, then consider using Canvas Blocker if your threat model fits. +#### 🟥 SUMMARY + +**The best any browser can confidently do, excluding Tor Browser, is fool naive scripts. In Firefox the best tool for that is RFP - it is performant, does not leak real values, and has timing mitigations against side channel attacks**. If you can handle a few RFP side-effects, cool - if not, then consider using Canvas Blocker if your threat model fits. --- @@ -10,7 +12,7 @@ This is a very simple generalized short summary about non Tor Browser browsers t --- -🟪 TOR BROWSER +🟪 **TOR BROWSER** If your threat model calls for anonymity and advanced fingerprinting protection, then **[USE TOR BROWSER](https://www.torproject.org/)**.