Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What about randomizing some values on every load to make existing, and additional values (as described in the article), result in new (and therefore useless) fingerprints on every load?


Then you will be the one presenting a new bogus value on every page load – something that makes you recognizable as part of a very small group. As explained in the article, random values are not the way.


I do not agree. First, being recognized as part of a group is better privacy-wise than being uniquely identified. And second, yes your unusual values will stand out, but as they always change, it makes it harder to link the browsing sessions together, and lower the confidence of the algorithm. It makes it harder to _track_ the profile in the long term.


Fingerprinting works by grouping people. The smaller the group, the better. And the group where values change constantly is bound to be very small.

Your assumption seems to be that these changes won’t be recognized. But they are very easy to recognize, e.g. by grouping the values by IP address. Same IP address but constantly changing random values? Yes, that’s a very reliable fingerprint.


Brave does that. Its the best way and breaks no websites.

https://brave.com/brave-fingerprinting-and-privacy-budgets/




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: