• TheGreatFox@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      1 year ago

      I expect adblockers will find a way around that. If nothing else, AdNauseam should work, as it tells the site that you clicked all of the ads it’s blocking (making it much harder for them to build a profile on you).

      • qwop@programming.dev
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 year ago

        I don’t really understand AdNauseam. Can’t they also not build a profile with a normal ad blocker, but you also completely avoid interacting with the trackers (so better for performance, data usage, etc)?

        • TheGreatFox@lemmy.world
          link
          fedilink
          English
          arrow-up
          8
          ·
          1 year ago

          Yes and no. It’s harder, but even with an adblocker, your internet signature (things like browser size, are you blocking ads, did you send a “do not track” header, etc) is enough to identify you in a lot of cases. AdNauseam goes the opposite direction, instead of hiding your data, it fills their data collection with so much garbage that they’ll have a hard time figuring anything out about you. From what I understand, it doesn’t actually load the ads, just sees where the ad points to, and tells the ad provider that you clicked it while at the same time blocking it. So it would be very slightly worse in terms of performance and data usage compared to uBlock Origin, but not in any noticeable way, since the stuff it sends is much smaller than any actual content.

    • capital@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      1 year ago

      Been wondering how they detect how many videos you’ve watched without being logged in.

      Cookies can be cleared, IPs can be changed, and if we all use something like the Mullvad Browser fingerprinting will be far more difficult.

      • Blamemeta@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        2
        ·
        1 year ago

        I just spin up new virtual machines, with different flavors of linux. They’re all fairly interchangable at this point.

      • Miyagi1337@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        So at the current moment, is there a way to use TOR browser and route it through Mullvad since TOR Browser would most likely be more anonymous having a larger, more common fingerprint?

          • Miyagi1337@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            1 year ago

            Sorry, I meant TOR Browser, as using TOR Browser + Mullvad VPN and default Mullvad DNS with exit and entry nodes in two different countries and cities + anti quantum computer algorithm to prevent MITM and other attacks alongside obfuscation alongside the Wireguard (IPV6 if you can, not every one can) has to be about the most secure setup I can conceive of possibly (only using TAILS could possibly further protect you). Probably overkill, but I like optimizing for the future when attacks become more prevalent in cyber security.

            I recommend every one tries Mullvad Browser, but i don’t think it’s the best idea for me and so I went back to TOR Browser.

            I was able to get Mullvad and TOR to play nicely together, I couldn’t at first until a reboot I hadn’t noticed I had forgotten to reboot at the time.

            • hyazinthe@feddit.de
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 year ago

              I was able to get Mullvad and TOR to play nicely together, I couldn’t at first until a reboot I hadn’t noticed I had forgotten to reboot at the time.

              Are you routing your Mullvad Browser traffic through TOR?