-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How are supercookies prevented? #375
Comments
Totally preventing fingerprinting is an impossible goal and not one we're trying to achieve. To better understand our approach I recommend the articles we have written about the approach from the browser page on our website. Regarding this website, have you tried the demo in Mullvad Browser? |
Everything is partitioned by first party and sanitized on close, and a lot of third parties are even prevented in the first place. A lot of |
@ruihildt Yeah I tried it, and I do get a different ID after a restart. |
ruihildt: Totally preventing fingerprinting is an impossible goal and not one we're trying to achieve. to recap ... no one is trying to prevent fingerprinting TB/MB do not retain any |
Mullvad Browser attempts to at least prevent some forms of tracking. From https://mullvad.net/en/browser :
I used "fingerprinting" to include tracking in general, perhaps a bit loosely. But if no I'm unsure what you mean by |
While I appreciate MullVad's browser efforts to prevent many common privacy leaks like WebRTC, totally preventing fingerprinting seems pretty hard given that users can always be identified by storing locally their fingerprints, whether it's in localStorage or even favicons.
Like this demo shows: https://supercookie.me/
The text was updated successfully, but these errors were encountered: