Thorin-Oakenpants 2024-11-09 11:45:39 +00:00
parent 26b2af1793
commit 904c0b4f59

@ -80,9 +80,9 @@ These extensions will not mask or alter any data sent or received, but may be us
- CDN extensions don't really improve privacy as far as sharing your IP address is concerned and their usage is fingerprintable as this Tor Project developer [points out](https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/22089#note_2639603). They are the [wrong tool](https://en.wikipedia.org/wiki/XY_problem) for the job and are not a substitute for a good VPN or Tor Browser. Its worth noting the [resources](https://git.synz.io/Synzvato/decentraleyes/-/tree/master/resources) for Decentraleyes are over six years out of date and would not likely be used anyway
* Cookie extensions
- ❗Sanitizing in-session is a false sense of privacy. [They do nothing for IP tracking](https://educatedguesswork.org/posts/traffic-relaying/). Even Tor Browser does not sanitize in-session e.g. when you request a new circuit. A new ID requires _both_ full sanitizing _and_ a new IP. The same applies to Firefox
- ❗Cookie extensions can lack APIs or implementation of them to properly sanitize
- e.g. at the time of writing: [Cookie Auto Delete](https://addons.mozilla.org/firefox/addon/cookie-autodelete/)
- > As of Firefox 86, strict mode is not supported at this time due to missing APIs to handle the Total Cookie Protection
- ❗Cookie extensions can lack APIs or implementation of them to properly sanitize: e.g.
- ⚠️ [last checked Nov 2024], [Cookie Auto Delete](https://addons.mozilla.org/firefox/addon/cookie-autodelete/) even instructs it's users to disable Total Cookie Protection - ⚠️ **DO NOT DO THIS** ⚠️
- > As of Firefox 86, strict mode is not supported at this time due to missing APIs to handle the Total Cookie Protection [... followed by instructions]
* Anti-Fingerprinting Extensions
- Redundant with either
- RFP (resistfingeprinting) - see [this](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-[To-RFP-or-Not]#-summary)