mirror of
				https://github.com/arkenfox/user.js.git
				synced 2025-10-31 05:45:27 +01:00 
			
		
		
		
	Updated 3.3 Overrides [To RFP or Not] (markdown)
| @@ -1,6 +1,8 @@ | |||||||
| 🟩 Previous: [Overrides [Common]](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) | 🟩 Previous: [Overrides [Common]](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) | ||||||
|  |  | ||||||
| 🟥 Summary: **The best any browser can confidently do, excluding Tor Browser, is fool naive scripts. In Firefox the best tool for that is RFP - it is performant, does not leak real values, and has timing mitigations against side channel attacks**. If you can handle a few RFP side-effects, cool - if not, then consider using Canvas Blocker if your threat model fits. | #### 🟥 SUMMARY | ||||||
|  |  | ||||||
|  | **The best any browser can confidently do, excluding Tor Browser, is fool naive scripts. In Firefox the best tool for that is RFP - it is performant, does not leak real values, and has timing mitigations against side channel attacks**. If you can handle a few RFP side-effects, cool - if not, then consider using Canvas Blocker if your threat model fits. | ||||||
|  |  | ||||||
| --- | --- | ||||||
|  |  | ||||||
| @@ -10,7 +12,7 @@ This is a very simple generalized short summary about non Tor Browser browsers t | |||||||
|  |  | ||||||
| --- | --- | ||||||
|  |  | ||||||
| 🟪 TOR BROWSER | 🟪 **TOR BROWSER** | ||||||
|  |  | ||||||
| If your threat model calls for anonymity and advanced fingerprinting protection, then **[USE TOR BROWSER](https://www.torproject.org/)**. | If your threat model calls for anonymity and advanced fingerprinting protection, then **[USE TOR BROWSER](https://www.torproject.org/)**. | ||||||
|  |  | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user
	 Thorin-Oakenpants
					Thorin-Oakenpants