Myth: Browsers can Fool AI by “Spoofing”

Reality: Spoofing is just lying with your words.

Even back in 2016, Google could detect spoofing:

Google gives your client a challenge to draw. This image is from their (now ancient tech) 2016 whitepaper: [12]

Then these drawings are analyzed at the pixel level,

And compared to what that browser, OS, and hardware can normally produce,

This is why the Chameleon Browser Extension whitelists Google and Cloudflare [14]

Because their app, and those like it, just LIE with “user-agents” (their words)

You can’t hide the fundamental nature of browsers,

For example, when someone asked if they should block the specific type of JavaScript (that hides your screen size), the GrapheneOS dev said: [10]

In other words, they fingerprint you based on what you choose to block,

And if you turn off JavaScript,

Enjoy the rest of the fun meme slideshow or get sources:

https://simplifiedprivacy.com/myths-of-privacy/fake-or-unrealistic-solutions-smashed.html

Reply to this note

Please Login to reply.

Discussion

Want! Where can get, pls? (also Qubes is not that bad. I don't play 4k videos, tho. And the fact that you can't hook up a modern android to the USB is annoying af. But for day to day development, I don't find it slow at all. All other USB tasks seem to work ok)

Hey thanks for reaching out, there's install instructions here:

https://simplifiedprivacy.com/vpn-install/easy-one-command.html

The same info is on docs.simplifiedprivacy.com in a more "formal" format

Thanks. Do you have plans to also make a windows version?

Hey not at the moment, due to Windows doing AI recall and such. It's possible for the future, but we'd need to do android first

I thought Microsoft backpeddled on recall after its userbase made known that there is a limit to the type of privacy violations they're willing to take.

Regardless of that, Windows has telemetry and privacy risks, so we wanted to focus on Linux first. As a start-up not using fiat funding, we have limited resources. So doing every platform right away isn't possible. Someone who is aware enough to care about the fingerprint, should be (in theory) aware enough to switch to Linux.

Even if you got Windows devices you need covered, you can use third party Wireguard apps with our service. So it's covered, just not fingerprinting

Makes sense.

If you have the interest and time you should do a deep dive on NymVPN/NymProject

My first impression is it seems like many improvements over VPNs and even Tor in some aspects, but would be interested in your opinion 🤔

We're a hostile direct competitor to them. They are two things:

a) a mixnet that's too slow for web traffic.

This is okay, but it should be packaged into chat apps itself. I doubt Monero users will put transactions through it over Tor nodes. I doubt it has any purpose for email, as most people are brainwashed with proton and setting up email on a VPS is beyond most people. So the only real use is chat apps.

b) 2 hop Wireguard.

For this we are a direct hostile competitor. They ignore the browser fingerprint which is a far greater threat, and they entrust random fucks to host it. Once we decentralize out, our approach will be much better.

https://simplifiedprivacy.com/nsa-taps-ocean-cables/so-we-have-a-two-layer-split-traffic-approach.html

I guess you are so busy spamming about Monero, you do not want to spend $1 of Monero, to beta test a Monero-focused network. You'd rather spend your time with the VCs printing money to do propaganda, which by the way is sponsored by the European Union's government. And lacks censorship resistance on the gateways. What a great way to control content, then to remove Tor Onion DNS, and replace it with Nym gateways whose IP can be found out.

Good points. Didn't realize you were a hostile direct competitor. I was genuinely asking because I figure you know more about this topic. I don't have a strong opinion on it mostly because I don't know enough about it.

What intrigued me originally were that some elements of Nym *seemed* like an improvement over your typical VPNs at obfuscating traffic (mixing, fake packets, uniform size packets, multiple hops, etc - in theory). I know it's not a real replacement over Tor/I2P because of the censorship aspects you mentioned.

I've never paid for Nym, and don't currently use it, but I've tried out the free version a few months back and it was noticeably slower at loading pages even with 2-hop. Some apps didn't work at all with it.

I've not tried your software yet, but I will when I get a chance.

Guilty on the Monero spamming 🤣

alright thanks bro. and speaking of monero, prehaps you may have some comments on the most recent podcast