-
Notifications
You must be signed in to change notification settings - Fork 90
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement Anti-detection for Fingerprinting Resistance #1206
Comments
in principle, this is not a browser problem.
@jamchowder If you want to contribute, your opinion is welcome. (context: #1020)
I am working on it, slowly :)
technically you draw in a canvas and then retrieve the bytes of the image to derive a hash, that is a value that many use for fingerprinting in the assumption that it somehow helps define the user's device.
I am aware of that: try to disable
is inevitable. but the biggest problem is the output ip, if you don't change that there's no point in using cromite. and I still haven't solved that problem. |
This does not work, the only noticable difference is on this page: The fingerprint is now static, yes, however it still shows the aforementioned error relating to getClientRects on the homepage. |
you could pre-install some kind of proxy switcher or make one of your own. it could auto rotate between proxies too if the user wants. that would be so cool. would take a lot of the work out of IP randomization. (also you should still think about my idea of adding a New Identity button like tor has. ) Something like Mullvad's proxy switcher on mullvad browser, or Foxy Proxy. i actually tried foxy proxy on cromite and it didn't work, i tried a lot of things on it. |
yes, I will try it at some point. |
Preliminary checklist
Is your feature request related to privacy?
Yes
Is there a patch available for this feature somewhere?
N/A
Describe the solution you would like
Now, first thing I want to get out of the way is that Cromite does an impecable job of fooling CreepJS (the most in-depth fingerprinting library out there, as far as I know), however, there are improvements that can be made.
CreepJS is actually used by some websites for bot detection, meaning the fact Cromite gets detected means it could make for an annoying browsing experience on some sites in future, even ones not using CreepJS specifically, such as Cloudflare Challenge loops, RECAPTCHA being unsolvable, etc.
The following detections are thrown for CreepJS, and should be looked at to see if they can be made undetectable:
If these detections are prevented, it may be possible to get the trust score up from 22% -F on Android and 25% -F on Desktop respectively.
This can easily be tested on a stock Cromite installation here;
https://abrahamjuliot.github.io/creepjs/
Describe alternatives you have considered
N/A
The text was updated successfully, but these errors were encountered: