• jqpabc123 6 hours ago |
    The simplest, readily available solution ---use Brave or LibreWolf.

    These can't prevent all fingerprinting but they can make it less reliable and more difficult and costly for a fingerprint to be relayed back to the mother ship.

    Personalized advertising is one of the dumbest ideas of the 21st century. Studies show it is less effective than context sensitive ads and it costs more. Participants in ad auctions are essentially flying blind with little reliable, verifiable insight into the process.

    • dewey 6 hours ago |
      Simplest solution is Firefox or Safari, not another Chromium browser or niche Firefox Fork.
      • tholdem 6 hours ago |
        If security is not that important, Firefox or Safari. If you care about security, Chromium.
        • dewey 6 hours ago |
          Any widespread recent security issues that were only affecting Safari and Firefox? That sounds like scaremongering to me.
          • timtom123 6 hours ago |
            Yes, there was a big one for FF in Oct https://nvd.nist.gov/vuln/detail/CVE-2024-9680
            • dewey 6 hours ago |
              And Chrome had one with severity "High" just three days ago, browsers will always have security issues that seem to be patched reasonably fast in the big three. Might as well pick one that's not part of the monoculture by a big advertising company, depending on your threat model of course.

              https://chromereleases.googleblog.com/2025/01/stable-channel...

              • tholdem 5 hours ago |
                Yes all software will have security issues, but Chromium is much harder target to exploit than Firefox.
        • fsflover 5 hours ago |
          Using Firefox on Qubes OS. Show me any good attack vector affecting me.
          • tholdem 4 hours ago |
            QubesOS is great if you need to do work and personal stuff on the same computer. I do most of my stuff in the browser and have a separate computer for work. I am mostly interested in making initial access as expensive and difficult as possible.

            You are still just as vulnerable or more vulnerable to malware stealing browser sessions, passwords, and everything you have on the AppVM the browser is running on than you are on a regular Fedora Workstation. Unless you only use disposable VMs, which you probably don't. If QubesOS had hardened templates, I would use it. When I used it, SELinux was not enforced, and I believe it still has passwordless sudo. Not sure what other mitigations are disabled in the default templates compared to regular, non-QubesOS Fedora Workstation.

            • fsflover 3 hours ago |
              > QubesOS is great if you need to do work and personal stuff on the same computer

              This is significantly underestimating the benefits of Qubes. Are you using your online banking in the same browser that you use for random web surfing? I do it in separate VMs with hardware isolation. Same compartmentalization with all other things.

              > You are still just as vulnerable or more vulnerable to malware stealing browser sessions, passwords, and everything you have on the AppVM the browser is running on than you are on a regular Fedora Workstation

              This is not true. I'm not using the same VM for everything but dedicated VMs for bank, email, HN, instant messaging and so on. A malware on a random website would only get the access to an empty VM, nothing more. Passwords can be securely saved in the related single-purpose browsers and in a plain text file (in an offline VM).

              > If QubesOS had hardened templates, I would use it.

              You misinterpret the Qubes' approach to security. If your VM is compromised, no hardening will save your data (https://xkcd.com/1200/). On Qubes, you should compartmentalize your digital live into security domains, such that you never run anything untrusted in trusted ones and never have anything valuable in untrusted ones. With such approach, hardening is irrelevant. More examples: https://www.qubes-os.org/news/2022/10/28/how-to-organize-you...

              > Unless you only use disposable VMs, which you probably don't.

              I don't understand why one wouldn't use them for everything not requiring saving the data. Of course I do use them and wrote this comment from one.

              More benefits: https://forum.qubes-os.org/t/how-to-pitch-qubes-os/4499/15

              • tholdem 39 minutes ago |
                > This is significantly underestimating the benefits of Qubes. Are you using your online banking in the same browser that you use for random web surfing? I do it in separate VMs with hardware isolation. Same compartmentalization with all other things.

                What about NetVM? All AppVMs us that so what if that get's compromised? Since the templates are not hardened at all, could the attacker jump from NetVM to AppVM?

                > I'm not using the same VM for everything but dedicated VMs for bank, email, HN, instant messaging and so on. A malware on a random website would only get the access to an empty VM, nothing more.

                So how many Templates and AppVMs do you have? Each of those dedicated VMs would need their own AppVMs at least. You have Domain: Bank, Domain: Email (do all email accounts get their own domain?), Domain: HN, Domain: Github, Domain: Stackoverflow, Domain: Signal and so on.

                > If your VM is compromised, no hardening will save your data

                So that means layered security is totally meaningless and instead of keeping it default, let's remove mitigations?

                > you never run anything untrusted in trusted ones and never have anything valuable in untrusted ones.

                In practice, this is close to impossible.

                > I don't understand why one wouldn't use them for everything not requiring saving the data

                Disposable VMs were the best part of QubesOS, but unfortunately, it's is pretty common that you need to login to something or save something, which means you can't use DisposableVMs for everything.

      • bobajeff 6 hours ago |
        Simplest solution is to not use computers anymore. Move to a cabin in the woods, away from civilization, and live off the fat of the land.
    • iLoveOncall 6 hours ago |
      Ah yes, Brave, the browser that highjacks websites to inject their own referral code, that's the right browser to use for privacy conscious people.
      • LightBug1 6 hours ago |
        What's your suggestion? Genuine question. I'm on Firefox.
        • SlimyHog 6 hours ago |
          Firefox.
          • jqpabc123 6 hours ago |
            Ahh, yes. The browser that tags every install with a unique identifier.
            • NemoNobody 6 hours ago |
              FF is too slow. Brave is where it's at.

              I do wish I paid for Brave but again - I don't see ads online so I don't what they do with my information anyways.

              I don't wonder about Google or Microsoft.

            • i_love_retros 5 hours ago |
              Got any more info on this?
        • NemoNobody 6 hours ago |
          Fr, ignore these people and try Brave Browser.

          I care less about privacy than I do an annoying Internet. There NO ADS with Brave Browser - like I just DO NOT SEE ADS anywhere on the Internet.

          Anyone that has been using Chrome can't possibly care about privacy anyways and they can't know what I mean about ads online.

          • iLoveOncall 5 hours ago |
            > There NO ADS with Brave Browser - like I just DO NOT SEE ADS anywhere on the Internet.

            There are no ads with any browser provided that you press one button and install a browser extension that blocks them.

            Brave isn't an issue regarding privacy, it's a security issue, see what I said on https://news.ycombinator.com/item?id=42656123.

            • NemoNobody 42 minutes ago |
              I don't think you know what I mean about ads. The pages are setup different on Chrome and Google inserts ads into everything, over the website itself, it doesn't matter what content you are viewing, you just need to be viewing anything.

              There are no ads on Brave. Not on the side of the pages, not in the middle the content scroll, not behind the content scroll, not before or after - no ads.

              If you use pirate streaming sites - I rarely, rarely have a popup ad on those when I do use them.

              It's not just ads, it's all about the user with Brave - most sites open in reader mode, I have to actually select to see the website itself, otherwise I just get all the content I want by default and only that content.

              I have 2 different compromised gmails - both of which happened during my years using Chrome, tho one was the Experian hack I'm pretty sure, Google is not secure, I don't know why anyone would ever think that.

              • iLoveOncall 20 minutes ago |
                I never have any ads whatsoever on any website that I visit. I legitimately cannot understand what you're talking about. Pages on Chrome and Brave look exactly the same.

                Seems like a user issue.

      • NemoNobody 6 hours ago |
        Well, I don't know what they do with it bc I do not see ads on Brave Browser - it's an entirely different Internet.
        • jqpabc123 5 hours ago |
          They use it for BAT tokens. You can "opt-in" to viewing some ads in exchange for crypto.

          Don't opt-in and enjoy an ad free experience.

          • iLoveOncall 5 hours ago |
            No, it's not that.

            Brave was caught inserting their own referral code in signup forms on websites. This is basically exactly what Honey is doing and under fire for right now.

            Brave basically does a man-in-the-middle attack on those websites. This goes MUCH further than just a privacy issue, it's a security issue.

            I don't care about privacy, it doesn't exist, and I use Chrome. But I won't compromise my security by using a browser that is happy to pirate the pages I view.

          • NemoNobody 5 hours ago |
            Oh, I suppose I do see some ads. Every now and then there will be a little popup recommending something - occasionally it's something even relevant. It's funny bc those ads are from Brave but they don't use the Browser, they come thru as desktop notifications and I only see them there. I do have an ad blocker that has always been on also, so I maybe augmenting the Brave experience a little but I just don't see ads online.

            I use Edge occasionally - which is far superior to Google and I don't kno how ppl deal with browsing the Internet like that, it's wildly frustrating.

      • pseudo0 5 hours ago |
        They were adding their own referral code to queries made in the search bar, not replacing or altering referral codes on websites. They apologized and reversed this after criticism back in 2020 (https://brave.com/blog/referral-codes-in-suggested-sites/).

        Overall Brave is pretty good, they build in ad-blocking by default and their own ad service is opt-in. They also have Tor and IPFS support that does not exist in Chromium, and are maintaining Manifest V2 support.

      • yjftsjthsd-h 3 hours ago |
        So... humor me... let's say that this is exactly true, and Brave adds or replaces referral codes. Is that a privacy problem? The only information that the website gets is that you're using Brave, but not where you got the link. We can absolutely talk about the ethics of the thing or such, but I can't see why privacy conscious people would care.
        • iLoveOncall 2 hours ago |
          No, it's a security problem, which is much worse.
          • yjftsjthsd-h an hour ago |
            Okay, then what's the security problem? What attacker does it enable, and what does it let them do?
            • iLoveOncall 19 minutes ago |
              The security problem is your very browser is performing man-in-the-middle attacks on you???
  • nine_zeros 6 hours ago |
    Use Firefox. Consumers need to wean away from spam companies.
    • Hizonner 6 hours ago |
      No browser is immune to fingerprinting, or even a little bit hard to fingerprint.
      • xnx 6 hours ago |
        Wouldn't Safari on iOS put your browser in a crowd with millions of other people?
        • jqpabc123 6 hours ago |
          No --- because fingerprinting techniques can detect subtle manufacturing differences in the underlying hardware.

          Even identical models of iPhone have minor variations in hardware and configuration and will produce different fingerprints.

        • Hizonner 6 hours ago |
          No. Not unless every other aspect of browser, many aspects of the computer, and many ways you can configure them were identical with every other user.

          In fact, Safari narrows you way down all by itself.

      • jqpabc123 6 hours ago |
        True --- but incomplete.

        Browsers can block known sources of advertising and fingerprinting code.

        It's hard to produce a fingerprint when the browser won't load the code.

      • hilbert42 5 hours ago |
        Perhaps so, but with JS disabled, Chrome uninstalled and all Google apps disabled and or removed together with a myriad of other tweaks including phone rooting, regular rebooting of routers to change IP address as well as using multiple different IP providers seems to minimize the problem.

        Can't remember when I last saw an ad (except for some static one within the page), and the last time I actually clicked on an ad was about 20 years ago.

        Oh and BTW, I use a dumb/feature phone for telephone, my smartphones have no SIMs and they connect to the net via a WiFi router (usually a pocket type), and no email is sent from smartphones. Nor do I use any social media (perhaps one if by some stretch HN could be classified as one).

        And Gibson Research's ShieldsUP can't find anything of note.

        Finally, without JS the web runs like a grayhound. Sites that break without it are not worth visiting anyway (and they're usually the worst privacy offenders).

        I've no need of them, as they say, there are pleanty more fish in the sea.

        All this nonsense is only a problem if you expect something for nothing and or like the trinkets and pretty baubles Google pretends to offer for free.

        PS: and I don't send or receive email from those who've gmail addresses. Boycotting those with gmail addresses sends a message that one is actually serious about privacy.

  • Hizonner 6 hours ago |
    I guess it'd make a difference if anybody'd been following the policy or Google'd been doing anything effective to enforce it. I find this, um, improbable.
  • fidotron 6 hours ago |
    He may or may not want the attention, but https://ladybird.org/ is coming along surprisingly well.

    In the meantime Safari/Firefox as appropriate.

    It's a shame really, because as a piece of software engineering Chrome is incredible.

    • 2OEH8eoCRo0 6 hours ago |
      Is it though? Or is it a monolithic rube Goldberg machine of lock-in?
      • gr4vityWall 6 hours ago |
        V8 is amazing.
        • 2OEH8eoCRo0 6 hours ago |
          Yeah but I should be able to swap in any JavaScript engine I desire or use one provided by the system. Browsers are far too bloated.
          • Dalewyn 6 hours ago |
            Playing Devil's Advocate, maybe browsers are still too incomplete. Once browsers are the operating system, everyone can simply speak Chrome and be done with it. The success of Electron strongly suggests both devs and users want to singularize on Chrome, so why not take it to the logical conclusion?

            Chrome is the abstraction layer to WindowsMacOSiOSLinuxAndroidBSDx86ARMRISC-Vspaghettisoup.

            • 2OEH8eoCRo0 5 hours ago |
              Electron is only successful because it saves development time compared to native applications, not because it's good for users.
        • NemoNobody an hour ago |
          Brave is better.
  • xnx 6 hours ago |
    This seems like nothing. Had Google ever enforced or even inspected its ad partners for use of fingerprinting?

    My assumption is that every site that knows how to do fingerprinting is doing fingerprinting and probably deanonymizing against a shared signature database.

    • NemoNobody 5 hours ago |
      Exactly. There is not anon browsing bc of a browser - you have to do a lot more than a browser to be anon online these days.
      • fsflover 5 hours ago |
        How about the Tor Browser?
        • Hizonner 5 hours ago |
          Very hard to link with your name or other elements of your "real identity" (unless you ever give them out over Tor).

          Probably only slightly hard to link all the things you do using a given installation of the browser to each other. They do at least try, but it's still basically Firefox, and it's not clear that it's even possible to make an unfingerprintable browser.

  • gr4vityWall 6 hours ago |
    My guess is that the way aggressive captchas and similar tools work these days is fundamentally incompatible with the original wording in Google's policy.

    Doesn't make it any less sad, though. The web is very hostile to the end user these days.

  • Hizonner 6 hours ago |
    What is with everybody suggesting this or that browser? They're all going to be fingerprintable. Using a less common browser just makes that easier... not that it will ever be hard.

    You might get some relief from some tracking, including via fingerprinting, by using comprehensive ad and tracking blockers. Or you might not, since CDNs are still probably going to track you.

    • fidotron 5 hours ago |
      It is because Google want a situation where they have a monopoly over being able to track web users, and Chrome is a major part of that.

      Because that is so blatantly anti competitive the adtech industry manipulates it into a sort of war of opaque identifiers (“user resettable device identifiers”) , attached to things like Roku, smart TV and phones, which then can be passed along with bid requests for ads and later used to effectively target people even on other devices in the same household, conveniently only by some players in the adtech world who then charge more.

      Breaking the Chrome monoculture will not solve this problem by itself, but it is a necessary step in getting there.

      • Hizonner 5 hours ago |
        You're not going to even improve the problem without completely shutting down the entire "personalized" advertising industry. Which I'm totally on board for, mind you.
        • fidotron 5 hours ago |
          That is true, and part of that would have to be enabling people to make money from web type content without shoving ads in it (or it being an ad for something else).

          My personal, controversial, conception of the future is to return to the notion of the Internet as a network of other networks, and then enable devs and content creators to sell apps and experiences which operate privately within those networks.

          • Hizonner 5 hours ago |
            > That is true, and part of that would have to be enabling people to make money from web type content without shoving ads in it (or it being an ad for something else).

            While I think that would be good, I did say personalized advertising, not all advertising. If every visitor to site.com sees the same rotation of ads, there's no need to track anybody. Still obnoxious and a vector for malware, of course. But not really the same problem.

            > My personal, controversial, conception of the future is to return to the notion of the Internet as a network of other networks, and then enable devs and content creators to sell apps and experiences which operate privately within those networks.

            It never really was that, you know. And I think putting everybody in walled gardens would be even worse than ad spyware.

    • 1vuio0pswjnm7 11 minutes ago |
      "What is witn everybody suggesting this or that browser? They're all going to be fingerprintable."

      No comment on "this or that browser", they all suck, but if use a client that does not run Javascript then this may reduce the amount of data, e.g., number of data points, contained in the "browser fingerprint". Every "browser fingerprinting" technique I have ever seen tries to use Javascript to add more data points to the fingerprint.

      With respect to HTTP headers, a client that only sends Host and Connection headers provides less data for a "browser fingerprint" than one that provides User-Agent and a number of other headers.

      Yes, one can still produce a "browser fingerprint" from a combination of minimal data points such as IP address, timestamp, TLS configuration and 1-2 required headers (no User-Agent). But this print contains less data than a browser fingerprint made from those data points _plus_ User-Agent string, other HTTP headers, data gathered using Javascript and so on. Consider that the print with less data may be easier to duplicate or mimic. If so, that might make it less reliable.

      "Using a less common browser makes that eassier... not that it will ever be hard."

      The mistake of this "argument" which we have seen countless times on HN is that it assumes the goal to stop browser fingerprinting 100%. What if the goal is only to reduce the amount of data in the fingerprint, making it potentially less reliable. For this purpose the popularity of the client, e.g., a browser, is irrelevent. The focus here is the quality and quantity of what the client sends. Popularity of the client only becomes important if the goal is to "blend in", i.e., for all clients to send the same data where possible. Arguably sending _less_ data would make that endeavour, i.e., all clients coordinating to send the same data, easier. Needless to say, "blending in" by using a popular, complex browser is a fantasy. It only makes fingerprinting easier.

      As such, the common HN reply along the lines of "using a less common browser makes fingerprinting easier" is nonsensical. It imagines that HN readers believe it is possible to have zero "fingerprint" by any server. It ignores the achievable goal of a fingerprint that contains minimal, i.e., less, data. It presumes that any "less common browser" sends the same amount of data to the fingerprinter as the more popular ones. That may or may not be true. The choice of client is siginificant in this regard.