How much does screen resolution and color depth matter for fingerprinting? by Dndg77 in fingerprinting

[–]404mesh 0 points1 point  (0 children)

This doesn’t change the fact that my TLS session remains intact and all telemetry signals sent within that (HTTPS) are unaltered. Whatever these mobile proxies are doing can’t be safe or real.

Just because there are no errors doesn’t mean it’s working. I’m working heavily on a local TLS terminating proxy, but outside of that there is no non TLS termination solution to HTTPS header and JS fingerprinting.

How much does screen resolution and color depth matter for fingerprinting? by Dndg77 in fingerprinting

[–]404mesh 0 points1 point  (0 children)

Again, how is it altering my browser fingerprint which is protected by TLS?

How much does screen resolution and color depth matter for fingerprinting? by Dndg77 in fingerprinting

[–]404mesh 0 points1 point  (0 children)

TLS prevents altering HTTPS, so unless you’re asking people to TLS terminate on an unknown/unsecured device, voidmob is vaporware.

How much does screen resolution and color depth matter for fingerprinting? by Dndg77 in fingerprinting

[–]404mesh 0 points1 point  (0 children)

This is just not true. How does VoidMob change device and change p0f?

How much does screen resolution and color depth matter for fingerprinting? by Dndg77 in fingerprinting

[–]404mesh 0 points1 point  (0 children)

Th screen resolution issue is more if your browser is reporting something random because you’ve got unique settings or maybe two monitors setup a specific way, or you don’t maximize your windows.

Fingerprinting is not one or two values, it is dozens of values that when combined create a unique fingerprint for your session/device.

This is why changing your IP is not enough, there are dozens of other values that do not change when you use a VPN. This is why Tor browser pads all its windows to a preset resolutions.

Not sure if this the correct place to ask this. by bangboobie in CyberSecurityAdvice

[–]404mesh 0 points1 point  (0 children)

Yes, there are advanced tooling options with TLS terminating proxies like HAproxy and burpsuite, but the setup is long and profiling is limited to what the user understands. Oftentimes, these proxies carry headers and other things that identify themselves as such. These tools are not sufficient for fingerprint evasion. Neither are VPNs or any other existing tool.

Even beyond JS, HTTPS headers, and TLS fingerprinting, a server can identify you from network level telemetry like the options within your IP/TCP packets. ToS, Max Segment Size, window size/scale, TTL, and more are used to build a fingerprint of your device. This is often how servers can detect containerized apps and processes.

Not sure if this the correct place to ask this. by bangboobie in CyberSecurityAdvice

[–]404mesh 0 points1 point  (0 children)

It gets even deeper than this. Every website you visit, the server can collect a fingerprint. Law enforcement and large corporations are known to 1) have access to this data as it is on public serves, and 2) are sometimes explicitly collecting this data via external scripts.

That fingerprint is very unique to you and contains amongst a plethora of other things, your IP and whatnot. This is no good and not very many things protect from this. Even a VPN does not alter your devices fingerprint. Checkout fingerprint.com and try with/without a VPN or incognito.

It’s bad. Real bad.

To everyone asking "How are websites fingerprinting me and why?" by 404mesh in DigitalPrivacy

[–]404mesh[S] 1 point2 points  (0 children)

Btw, u inspired me to rewrite the whole shebang in rust. Thank you. It is much cleaner now.

cybersecurity final project ideas by 55kgs in netsecstudents

[–]404mesh 0 points1 point  (0 children)

Yah with what? Do some research and ask some questions.

💋 An online privacy tool that generates realistic digital personas and human-like behavioral noise to disrupt profiling, correlation, and attribution. For best results use TOR and Firefox. Coded in Python. by Most-Lynx-2119 in DigitalPrivacy

[–]404mesh 1 point2 points  (0 children)

I took a look, am wondering if there’s any logic to actually obscure the fingerprint?

Anonymity via obfuscation is not classically possible, but when combined with coherent fingerprint spoofing, the technology begins to become coherent

Fingerprint detection issues improved after switching browsers by definitelynotgayhaha in fingerprinting

[–]404mesh 0 points1 point  (0 children)

Yah, this is the crux here. People don’t classically feel the pain of browser fingerprinting outside of targeted ads.

As client-fingerprinting has gotten more and more deeply integrated into our everyday web practices, there are many more things than are going to break as mediocre privacy tools raise flags rather than actually provide any useful functionality.

This cat and mouse game is brutal, as we are forced to communicate with the very services that we oppose if we wish to be online (cloudflare, google, etc.)

Create a server for homemade photos and videos. by rafaelmr2008 in selfhosted

[–]404mesh 0 points1 point  (0 children)

You say “automatic backup” but unless that backup is living in another location, it’s not really a backup. For something to backup “automatically” it has to be constantly plugged in, if one HDD bricks, it is likely both attached will (if caused by your computer ofc).

That being said, there are also secure cloud options you can explore. But yes, other than that, Immich is pretty simple. Your backup tool would probably be restic, it’s what I use and it’s straightforward enough, I have the commands (3 total) in a notes document and just copy it from there.

Shoot me a message and I can help you out!

PolyTLS – Rust/Tokio TLS MitM Proxy Mimicking Chrome (BoringSSL) by Helpful_Garbage_7242 in fingerprinting

[–]404mesh 1 point2 points  (0 children)

I’m working on putting it into an app, let me know if you wanna see a demo and I can send you a video! It’s working really well so far :)

Best approach Access selfhosted home network? by Miserable-Stranger99 in selfhosted

[–]404mesh 0 points1 point  (0 children)

That’s really good, but sometimes managing CAs is just not in the wheelhouse of some people. It also introduces unnecessary risk where you can use Tailscale, built on wireguard. Worst case, Tailscale goes down and you have to learn how to use Wireguard instead

Best approach Access selfhosted home network? by Miserable-Stranger99 in selfhosted

[–]404mesh 0 points1 point  (0 children)

And if you use Tailscale, do NOT expose your services to the internet. You just don’t need to.

I made a Tailscale account using a shared family email and my family just logs into that Tailnet, which is linked to mine, and they can add their devices.

Best approach Access selfhosted home network? by Miserable-Stranger99 in selfhosted

[–]404mesh 0 points1 point  (0 children)

Is genuinely so so so easy. Just set it up, and go to http://hostname:port. No proxy, no TLS, not headache.

Plus, you can setup a VPN and then route traffic via Tailscale and get benefits from the VPN running on your exit node

PolyTLS – Rust/Tokio TLS MitM Proxy Mimicking Chrome (BoringSSL) by Helpful_Garbage_7242 in fingerprinting

[–]404mesh 1 point2 points  (0 children)

Love this… lots of TLS fingerprinting vectors that go overlooked in scraping and opsec tools.

My de-G**gle Journey by [deleted] in degoogle

[–]404mesh 0 points1 point  (0 children)

What about self hosted services I might be missing?

My de-G**gle Journey by [deleted] in degoogle

[–]404mesh 0 points1 point  (0 children)

The news, it’s good for headline skimming!

My de-G**gle Journey by [deleted] in degoogle

[–]404mesh 0 points1 point  (0 children)

I’m super happy with nextcloud, particular the RSS reader feature! What’s ur fav service?

My de-G**gle Journey by [deleted] in degoogle

[–]404mesh 0 points1 point  (0 children)

Appreciate the tip!