Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's enough to narrow you down to a specific bucket. E.g. "affluent white young male in his 30s in a specific neighbourhood" and serve you ads and news. Collate with a few other sites (even airline checkouts and boarding pages have tracking), and you have a close enough match.

The worst part of this? Trying to hide from fingerprinting makes your fingerprint more unique



> Trying to hide from fingerprinting makes your fingerprint more unique

Didn't seem so in the experiment in the article.

Sure they'll be able to place you in the bucket "tor user", but is that really more narrow than what you'd get without Tor?


Probably. Tor is not something most people use unless they have something to hide.

No, I don’t care about the one time you downloaded a gentoo iso over tor.


Using Tor might stop them to track you in a unique way, but they can for sure put you in the basket of the 0.1% of Tor users


You can easily do this by looking at the IP address. All exit node IPs are public, you don't need browser fingerprinting for that.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: