2021-05-21 09:08:00
Week in OSINT #2021-19 - Sector35 - Browser Fingerprinting
When you talk to an OSINT expert about staying anonymous, they'll probably tell you about 'fingerprinting' sooner or later. This is where third parties assign a unique identifier to your browser or system, making it possible to track you, even if no cookies are set. The research by FingerprintJS goes beyond that and shows that even with the best OpSec there seem to be methods to fingerprint your systems. Simply by checking what applications are installed on a system. If you need to keep your VM's unique from now on, you'll might have to start thinking about installing a subset of applications, or removing them, to create a fingerprint that might be generic enough to beat this. To check the uniqueness of your browser, there's the website 'Am I Unique'. But they haven't incorporated this technique yet, so they mainly look at OS and browser, screen size, installed extensions, language settings and so on.
We found a vulnerability that allows for cross-browser tracking in Chrome, Firefox, Safari, and Tor. Read our article to learn more about the exploit, and try our live demo for yourself - https://t.co/SKkK2Exz9u#privacy #Chrome #Safari #tor #webdevelopment
— FingerprintJS (@FingerprintJs) May 13, 2021
Link: https://fingerprintjs.com/blog/external-protocol-flooding/
AmIUnique: https://amiunique.org
434 views06:08