diff --git a/1.1-To-Arkenfox-or-Not.md b/1.1-To-Arkenfox-or-Not.md index 6dec9e6..d5bc7af 100644 --- a/1.1-To-Arkenfox-or-Not.md +++ b/1.1-To-Arkenfox-or-Not.md @@ -30,7 +30,7 @@ After that, the benefits get incrementally smaller, but they do add up: your mil 🟪 FINGERPRINTING -Most of the above deals with [state](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) and other cross-origin linkability mechanisms such as navigational tracking. +Most of the above deals with [state](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) 1 and other cross-origin linkability mechanisms such as navigational tracking. Stateless tracking, or fingerprinting, is a little more complex. If your threat model calls for anonymity and advanced fingerprinting protection, **THEN USE TOR BROWSER**. Otherwise you can read more about it later in the wiki where arkenfox helps mitigate it, but you have options.