[Privoxy-users] Suppressing/modifying some browser fingerprints (ie. Am I Unique?)
    Lee 
    ler762 at gmail.com
       
    Fri Jul 17 23:04:40 UTC 2020
    
    
  
On 7/17/20, U.Mutlu <um at mutluit.com> wrote:
> Lee wrote on 07/17/2020 05:58 PM:
>>
>> So if you're trying to keep your private web browsing private, I'd
>> suggest using the TOR Browser & leaving it at that.
>
> Hi Lee, thx.
> My IP is my least concern. No, I don't need to hide my IP by using Tor etc.
> I just want to block all ads and all the spying trackers inside the HTML,
> as well a solution for the said HTML and JS queries about my system
> that can serve as a unique identifier for all the other sites one visits.
OK, Privoxy can help with that :)
> I'm sure these companies and agencies are commercially exchanging
> all the data they collect about the system and the person behind it.
>
> And: goverment spying its citzens by installing a trojan is becoming
> more and more a big problem in this f*cking Orwellian #1 EU country :-(
> I suspect they somehow install it remotely via the normal HTML traffic.
Yes, is possible.  I suspect not probable, but still.. my attempt to
"raise the bar" is to have DNSSEC enabled (either your own validating
dns resolver or DOH/DOT to a resolver that has DNSSEC enabled) and
allowing javascript only from https sites.
> Such web filtering plus firewall filtering could possibly prevent it I think
> & hope.
I have the same hope :)
> Don't get me wrong: I really don't have anything to hide, but I don't
> want to be a victim of such totalitarian police state methods.
> IMO, most of the leading western countries nowadays have become a
> "land of confusion, lies, and oppression"... :-(
Yes, there's much not to like about current circumstances :(
>> Privoxy now has the ability to act as a man-in-the-middle (MITM) and
>> see all the clear-text traffic coming and going :)  But it's not a
>> released product yet, so you have to build the latest development
>> version of privoxy from git -- see
>> https://www.privoxy.org/user-manual/installation.html#INSTALLATION-SOURCE
>>
>> You'll also need mbed-tls for the MITM functionality -- I grabbed the
>> 2.16.7 version:
>> https://github.com/ARMmbed/mbedtls/releases/tag/mbedtls-2.16.7
>>
>> Once you have the ability to do https-inspection it's almost like
>> you've been time-warped back to 2010 - all the traffic is clear-text,
>> and you can modify most anything 'on-the fly' :)
>
> This is indeed very interessting! I'll definitely try it.
> I guess the user will get a https-warning, but I can live with that since I
> know the reason is local, home-made.
Actually, no.  You create your own "trusted" CA cert, import it into
your trusted cert store and you're good to go :)
Regards,
Lee
    
    
More information about the Privoxy-users
mailing list