Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)HO
Posts
70
Comments
269
Joined
4 wk. ago

  • thank you you seem to understand very much about windows and computer. May I ask

    How to run something you don't trust without performance lost?

    How to restrict software permission with open source software?

    If you don't want to type please provide videos and articles you read before that address my question

    I'm keen to read

    Thank you

  • Programs can be restricted by filesystem permissions and the OS firewall, and not running them as admin

    can you explain how to do this?

    steam games for example are nearly impossible to run without admin, can I restrict filesystem permissions for these software?

  • I think there might be a bit of misunderstanding about what those permissions mean. The extensions just need to be able to "see" the contents of a web page in order to be able to hide ads, change font & background colors, edit URLs, or redirect resource requests. There is no other way for them to perform those functions unless they have permission to read the original data presented by websites you visit.

  • Answered by @listless@lemmy.cringecollective.io

    Web pages are not allowed to list your extensions. They can indirectly surmise you have certain extensions based on how your requests differ from expectations. For example, if they have advertisements, but your browser never actually makes any requests to load the images, CSS, JS or HTML for the advertisements, they can deduce you have an ad-blocker. That’s a datapoint they now have to ID you: “has an ad-blocker”

    Now let’s say they have an ad they know AdBlockPlus allows, but uBlock Origin doesn’t. They see your browser doesn’t load that ad. Another datapoint: “Not using AdBlockPlus”.

    Based on what requests go back and forth between your browser and their servers, they map out a unique fingerprint.

  • Web pages are not allowed to list your extensions. They can indirectly surmise you have certain extensions based on how your requests differ from expectations. For example, if they have advertisements, but your browser never actually makes any requests to load the images, CSS, JS or HTML for the advertisements, they can deduce you have an ad-blocker. That’s a datapoint they now have to ID you: “has an ad-blocker”

    Now let’s say they have an ad they know AdBlockPlus allows, but uBlock Origin doesn’t. They see your browser doesn’t load that ad. Another datapoint: “Not using AdBlockPlus”.

    Based on what requests go back and forth between your browser and their servers, they map out a unique fingerprint.

    Thank you so much that makes sense

  • Sincere thanks

    @bjoern_tantau@swg-empire.de

    Most of those things cannot be collected through JavaScript.

    Local time can.

    RAM can only be approximated to protect user privacy. Edit: And it’s not available on Firefox.

    OS+version are already in your browser’s user-agent string that is sent out with every request you make.

    Machine hardware cannot be enumerated. JavaScript can try to guess your GPU based on what it can do with WebGL.

    There is no way to get a serial number or similar.

    To spoof timezone/OS+version/browser+version ... and disable WebGL, use https://sereneblue.github.io/chameleon/

    I guess spoofing will not make me stand out?