Between uBlock Origin, Privacy Badger, ClearURLs, Decentraleyes, and Privacy Possum, I’m having a hard time deciding which ones I actually need and which ones I don’t. Do they actually do different things, or are they largely the same?

  • hitagi@ani.social
    link
    fedilink
    arrow-up
    36
    ·
    1 year ago

    uBO is enough for me. If I need more than that, I’d probably just use something like Tor instead.

    • Infiltrated_ad8271@kbin.social
      link
      fedilink
      arrow-up
      14
      arrow-down
      1
      ·
      edit-2
      1 year ago

      Note that this is targeted to arkenfox users, who by default use privacy.resistfingerprinting (unlike most users); without it, canvasblocker is also recommended.

        • Infiltrated_ad8271@kbin.social
          link
          fedilink
          arrow-up
          4
          ·
          1 year ago

          I suppose that I can be leaving some other (like disabling webgl), but in principle yes. The bad thing is that this setting can be annoying, it does things like change the time zone, force the light theme, always start in window, among many others.

          • ink@r.nf
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 year ago

            it’s strange for them to specifically choose the light prefers-color-scheme instead of ignoring it completely. So if a website has a dark default interface with an optional prefers-color-scheme:light, it will use the light interface ignoring the default.

            Seems counterintuitive

          • LinkOpensChest.wav@lemmy.one
            link
            fedilink
            arrow-up
            2
            arrow-down
            1
            ·
            1 year ago

            I currently use JShelter because that seemed to be the app of choice among r/privacy users

            Is CanvasBlocker better?

          • ChiefGhost295@lemmy.one
            link
            fedilink
            arrow-up
            1
            ·
            1 year ago

            This is wrong. By enabling privacy.resistFingerprinting you cannot make yourself more unique in Firefox because you’re already unique. I would read this guide by the Arkenfox project about fingerprinting. The guy has worked for the Tor browser, so he knows his stuff. The summary is that the privacy.resistFingerprinting is the best tool that Firefox has against fingerprinting, but it can only ”fool naive scripts.” If you’re really worried about fingerprinting and want to defeat advancing fingerprinting, the only option is to use either Tor or Mullvad Browser depending on your threat model.

  • ZeroHora@lemmy.ml
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    4
    ·
    1 year ago

    There is a great video from Techlore about hardening firefox, watch it and try some of the tips.

    TLDR: uBlock Origin properly configured and some tweaks on firefox settings is good enough.

    • ink@r.nf
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      2
      ·
      1 year ago

      bleh. more face than actual content (where text is actually better to relay these kind of information). annoying af.

      The firefox sertting labels are self explanatory, no youtube video required. Anything more, there are tons of articles and discussions threads to suit your needs.

      https://brainfucksec.github.io/firefox-hardening-guide

  • mokazemi@lemmy.ml
    link
    fedilink
    arrow-up
    11
    arrow-down
    2
    ·
    edit-2
    1 year ago

    Ublock Origin is enough as blocker (It’s so complete in terms of filters. also it’s recommended by Mozilla, and it’s very light). Also Decentraleyes for some third-party contents. Other blockers do the same (they usually use the same blocking lists, too). I only have these two, along with setting Firefox tracking protection to Strict. I guess it’s enough. (Though, you can see UBO wiki to have more advanced blockings.)

  • lckdscl [they/them]@whiskers.bim.boats
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    2
    ·
    edit-2
    1 year ago

    uBlock origin and CanvasBlocker/JShelter are probably enough. There’s also uMatrix, which gives you more granular control over what to block or allow.

  • chayleaf@lemmy.ml
    link
    fedilink
    arrow-up
    6
    ·
    1 year ago

    I use noscript and whitelist javascript URLs per-origin, this coupled with uBlock means even the trackers uBO doesn’t block usually don’t work

  • _s10e@feddit.de
    link
    fedilink
    arrow-up
    4
    ·
    1 year ago

    Now commented on the built-in tracker protection in Firefox? Is it useless.

    Personally I bank on uBo.

  • Carighan Maconar@lemmy.world
    link
    fedilink
    arrow-up
    3
    arrow-down
    1
    ·
    1 year ago

    “Depends”.

    Keep in mind that figuring out some information about your client is not unwanted, like screen size and device type (desktop vs mobile page and also desktop page orientation), browser and version for special handling code, or languages as defined in the browser to decide which language version to show.

    The same readouts, of course, also enable tracking.

      • Acters@lemmy.world
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        1 year ago

        I dont like people who intentionally create mischief and chaos in orderly systems. Personally, I do not think ad networks, their offerings, quality control and freedom of use is capable to a level in which it can be considered an orderly system. It is already too chaotic in my eyes. Threat actors can already target and cause more chaos to many of these metrics that ad nauseum targets. It is insignificant to my eyes to use ad nauseum or block its use. To even think about the moral and ethical implications is too obtuse when ad systems are already clearly pushing those boundaries