From d2aab54efe3d46786ac81f76f2e0ef39a5fd9538 Mon Sep 17 00:00:00 2001 From: Thorin-Oakenpants Date: Sun, 30 Jan 2022 02:55:53 +0000 Subject: [PATCH] Updated 3.3 Overrides [To RFP or Not] (markdown) --- 3.3-Overrides-[To-RFP-or-Not].md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/3.3-Overrides-[To-RFP-or-Not].md b/3.3-Overrides-[To-RFP-or-Not].md index 6fa9ccb..60c574f 100644 --- a/3.3-Overrides-[To-RFP-or-Not].md +++ b/3.3-Overrides-[To-RFP-or-Not].md @@ -77,7 +77,7 @@ Due to it's nature, which is effectively breaking web standards whilst protectin - timezone is always UTC0 - prefers-color-scheme is always light -If you can live with that, and you should have a secondary browser for the occasional site glitch, then use RFP as the best solution possible. Otherwise, if you think the threat fits your wheelhouse, use Canvas Blocker with canvas and audio randomizing (the rest is not really needed and will add perf costs). Note that extensions lack APIs to fully protect metrics, but naive scripts are still probably not that advanced +If you can live with that, and you should have a secondary browser for the occasional site glitch, then use RFP as the best solution possible. Otherwise, if you think the threat fits your wheelhouse, use Canvas Blocker with canvas and audio randomizing (the rest is not really needed and will add perf costs). Note that extensions lack APIs to fully protect metrics, but naive scripts are likely not that sophisticated 1 Assuming it is even fingerprinting and widespread, this does not compromise your fingerprint - it is a single metric and only on those sites you exempt