• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
Restore Privacy Logo

Restore Privacy

Resources to stay safe and secure online

  • Privacy Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search
    • Password Manager
    • Tor
    • Privacy Tools
  • Reviews
    • Email Reviews
      • ProtonMail
      • Tutanota
      • Mailfence
      • CTemplar
      • Mailbox.org
      • Posteo
      • Fastmail
      • Hushmail
    • VPN Reviews
      • ExpressVPN
      • NordVPN
      • Surfshark
      • Perfect Privacy
      • CyberGhost
      • IPVanish
      • Private Internet Access
      • Netflix VPN
      • Best VPN for Torrenting
      • NordVPN vs ExpressVPN
    • Cloud Storage Reviews
      • pCloud
      • Nextcloud
      • IDrive
      • SpiderOak
      • Sync.com
      • MEGA Cloud Storage
      • Tresorit
    • Secure Messenger Reviews
      • Telegram
      • Signal
      • Wire
    • Password Manager Reviews
      • KeePass
      • NordPass
      • 1Password
      • Dashlane
      • LastPass
      • Bitwarden
  • VPN
    • What is VPN
    • VPN Coupons
      • ExpressVPN Coupon
      • NordVPN Coupon
      • NordVPN Cyber Monday
      • Cyber Monday VPN Deals
      • ExpressVPN Cyber Monday
      • Surfshark Cyber Monday
    • Best VPN Services
    • VPN Router
    • Free VPN
    • Free Trial VPN
    • Cheap VPNs
    • VPN for Firestick
  • Reports
  • Mission
  • Search
  • Privacy Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search
    • Password Manager
    • Tor
    • Privacy Tools
  • Reviews
    • Email Reviews
      • ProtonMail
      • Tutanota
      • Mailfence
      • CTemplar
      • Mailbox.org
      • Posteo
      • Fastmail
      • Hushmail
    • VPN Reviews
      • ExpressVPN
      • NordVPN
      • Surfshark
      • Perfect Privacy
      • CyberGhost
      • IPVanish
      • Private Internet Access
      • Netflix VPN
      • Best VPN for Torrenting
      • NordVPN vs ExpressVPN
    • Cloud Storage Reviews
      • pCloud
      • Nextcloud
      • IDrive
      • SpiderOak
      • Sync.com
      • MEGA Cloud Storage
      • Tresorit
    • Secure Messenger Reviews
      • Telegram
      • Signal
      • Wire
    • Password Manager Reviews
      • KeePass
      • NordPass
      • 1Password
      • Dashlane
      • LastPass
      • Bitwarden
  • VPN
    • What is VPN
    • VPN Coupons
      • ExpressVPN Coupon
      • NordVPN Coupon
      • NordVPN Cyber Monday
      • Cyber Monday VPN Deals
      • ExpressVPN Cyber Monday
      • Surfshark Cyber Monday
    • Best VPN Services
    • VPN Router
    • Free VPN
    • Free Trial VPN
    • Cheap VPNs
    • VPN for Firestick
  • Reports
  • Mission
  • Search

Browser Fingerprinting – Explanation, Tests, & Solutions

September 26, 2020 By Sven Taylor — 152 Comments

Browser Fingerprinting

In this guide we cover all aspects of browser fingerprinting and device fingerprinting. In addition to explaining what exactly this is, we’ll also show you how to protect yourself against these threats.

Many people use VPN services to hide their IP address and location – but there is another way you can be identified and tracked: through browser fingerprinting.

Whenever you go online, your computer or device provides the sites you visit with highly specific information about your operating system, settings, and even hardware. The use of this information to identify and track you online is known as device or browser fingerprinting.

As browsers become increasingly entwined with the operating system, many unique details and preferences can be exposed through your browser. The sum total of these outputs can be used to render a unique “fingerprint” for tracking and identification purposes.

Your browser fingerprint can reflect:

  • the User agent header
  • the Accept header
  • the Connection header
  • the Encoding header
  • the Language header
  • the list of plugins
  • the platform
  • the cookies preferences (allowed or not)
  • the Do Not Track preferences (yes, no or not communicated)
  • the timezone
  • the screen resolution and its color depth
  • the use of local storage
  • the use of session storage
  • a picture rendered with the HTML Canvas element
  • a picture rendered with WebGL
  • the presence of AdBlock
  • the list of fonts

How accurate is browser fingerprinting?

Some researchers have found this method of identification to be extremely effective.

Why is this being done?

Browser fingerprinting is just another tool to identify and track people as they browse the web. There are many different entities – both corporate and government – that are monitoring internet activity, and they all have different reasons for doing so. Advertisers and marketers find this technique useful to acquire more data on users, which in turn leads to more advertising revenue.

Some websites use browser fingerprinting to detect potential fraud, such as banks or dating websites, so it’s not always nefarious.

Surveillance agencies could also use this to identify people who are employing other privacy measures to cloak their IP address and location, such as with VPN services or the Tor (onion) network.

Browser fingerprinting test websites

One good test website to see all of the information that is being revealed by your browser is www.deviceinfo.me.

browser fingerprinting test

There are also a few websites that reveal browser data and also assess a “uniqueness” score based on your variables in comparison to their database of browsers.

  • Panopticlick is run by the Electronic Frontier Foundation.
  • amiunique.org is another good resource, but unlike Panopticlick, it is open source and provides more information and updated fingerprinting techniques, including webGL and canvas.

Are browser fingerprinting test websites very accurate?

Yes and no.

Yes, these websites do provide accurate information about your browser’s fingerprint and the different values being gathered.

No, the “uniqueness” conclusion about your browser from these websites can be wildly inaccurate and very misleading. Here’s why:

  1. Data sample: Panopticlick and amiunique.org are comparing your browser’s fingerprint to a giant database of old, outdated browsers – many of which are no longer in use. When you test your browser’s fingerprint with an updated browser, it may show it as being extremely rare and unique, even though the majority of people are using the same updated version. Conversely, running the test with an old, outdated browser may show a very good result (not unique) when in reality very few people are using the older browser today.
  2. Screen resolution: At least on desktop machines, most people regularly adjust their browser screen size. Every minor screen size value will be measured as a factor for uniqueness, which can be misleading.
  3. Randomized fingerprints: Another problem with these test sites is that they don’t account for randomized fingerprints that can be regularly changed through browser extensions. This method may be an effective way to prevent real-world fingerprinting, but it can’t be tested/quantified through these sites.

In general, the browser fingerprinting test websites are good for revealing the unique information and values that can be rendered from your browser. Aside from that, however, trying to beat the test by getting the lowest “uniqueness” score may be a waste of time and counterproductive.

How to mitigate your browser fingerprint

Before we jump into potential solutions, it’s important to note that implementing browser fingerprinting protection methods may break some websites. Be sure to research these different options carefully before adjusting your browser settings.

Another consideration is your threat model. How much privacy do you need or want? The answer to that question will be different for every user.

Lastly, I use the word “mitigate” rather than “solve” because browser fingerprinting is a very complex and evolving issue. For example, a new study revealed that there’s nothing you can do to mitigate some fingerprinting attacks on smartphones (discussed more below).

Here are some good ways to mitigate your browser fingerprint:

1. Browser modifications and tweaks

Depending on the browser you are using, you might have some different options for tweaks and modifications to mitigate browser fingerprinting. Below we’ll discuss various Firefox and Brave browsers, which are both secure and private browsers.

Firefox browser fingerprinting

Firefox is a good browser for privacy and security, and it can also be modified and hardened for your unique needs. (For an overview of Firefox privacy tweaks, see the Firefox privacy guide.) The first thing you need to do is type about:config into the URL bar of Firefox, hit enter, then agree to “accept the risk” and make the following changes:

  • privacy.resistFingerprinting (change to true) – Changing this value to true will offer some basic protection, but it’s far from a complete solution. The privacy.resistFingerprinting preference was added to Firefox as part of the Tor Uplift project and it continues to be improved.
  • webgl.disabled (change to true) – WebGL is another tricky issue for privacy and security. Disabling this preference is generally a good idea – see some of the issues with WebGL here.
  • media.peerconnection.enabled (change to false) – Disabling WebRTC is a good idea since this can reveal your true IP address, even when you are using a good VPN service. See the WebRTC leak guide for more details and how to disable WebRTC in other browsers.
  • geo.enabled (change to false) – This disables geolocation tracking.
  • privacy.firstparty.isolate (change to true) – This is another great update from the Tor Uplift project that isolates cookies to the first party domain.

Note: This is just a brief overview of changes that improve your privacy and help to mitigate your browser fingerprint. Nonetheless, there are many different factors that go into fingerprinting and you may still have a unique fingerprint even with these changes.

Firefox with the ghacks user.js file

Another great option is to run Firefox with a unique user.js file, such as the ghacks user.js. This is a custom Firefox configuration file that has been modified for more privacy and security. I like this option because it can save lots of time with setup and is regularly updated and improved. See the Wiki page for an overview and setup instructions.

When I tested a fresh install of Firefox with the ghacks user.js file, amiunique.org showed my browser fingerprint as as not unique.

Brave browser fingerprinting

Although it is based on Chromium, the Brave Browser may be a good option for those wanting a simple, privacy-focused browser that blocks tracking by default and still supports Chrome extensions. Brave allows you to enable fingerprinting protection, which is under the Brave Shields settings:

fingerprinting protection Brave

See also this article on Github discussing different aspects of fingerprinting protection in Brave.

2. Browser extensions and add-ons to minimize or spoof your fingerprint

There are a number of different browser extensions and add-ons that you may find useful. With that being said here are a few things to remember:

  1. Be careful with third-party extensions, which could potentially undermine your privacy and security.
  2. Be mindful that using extensions may make your browser fingerprint more unique (many factors).

Now that we’ve gotten those disclaimers out of the way, let’s examine some browser add-ons that may be useful:

Firefox browser:

  • Canvasblocker by kkapsner – Protects against canvas fingerprinting methods (source on GitHub)
  • Trace by AbsoluteDouble – Protects against various fingerprinting methods (source on GitHub)
  • Chameleon by sereneblue – Allows you to spoof user agent values (source on GitHub)
  • User-Agent Switcher by Alexander Schlarb – Allows you to spoof user agent (source on GitLab)

There are many other Firefox add-ons you may want to consider as well, which are discussed in the Firefox privacy guide. Some of these add-ons are also available for Chromium-based browsers, such as Brave.

Some people recommend spoofing different user agents through a browser extension, while others suggest this is a bad idea because it might make you more “unique”. Of course, there are many factors to consider, but adding noise to your fingerprint may not be a bad strategy.

For example, with Chameleon, you can cycle through different user agents at various time intervals:

user agent spoofing

Now let’s look at another option for modifying your browser fingerprint: the use of virtual machines.

3. Virtual machines

You can also consider running different virtual machines, which can utilize different operating systems on your host computer. VirtualBox is FOSS and offers an easy way to run different Linux VMs for more privacy and security. There are many different video tutorials online, depending on your operating system and the VM OS you are looking to use.

Virtual machines offer numerous advantages in terms of privacy and security, while also protecting your host machine. For privacy, VMs allow you to easily spoof different operating systems and also chain VPN services, as explained in the multi-hop VPN guide. This also helps keep your host machine secure by isolating a virtual environment. If the VM were to be compromised, simply delete it and create a new one. You can also use different VMs for different purposes.

4. Tor Browser

Another option is to use the Tor browser, which is simply a hardened and protected version of Firefox. It includes numerous privacy and security modifications that are built into the default version:

  • HTTPS Everywhere
  • NoScript
  • Anti-tracking features
  • Canvas image extraction blocked
  • WebGL blocked
  • Operating system cloaking (shows as Windows 7 for all users)
  • Timezone and language preferences blocked

The key here is to use the default version (the developers do not recommend adding any plugins or extensions because this could compromise the browser’s effectiveness).

You can get the latest version of the Tor browser here.

Here were the fingerprint test results with the Tor browser from Panopticlick:

tor browser fingerprint

The default version of the Tor browser is configured to run with the Tor (anonymous/onion) network. While the Tor network does have added benefits in terms of privacy, it also has a number of disadvantages:

  • Your internet speed will be reduced to around 2 Mbps, making streaming videos or music nearly impossible
  • Tor only encrypts traffic through the browser, rather than encrypting all traffic on your operating system like a VPN
  • Tor is vulnerable to IP leaks, especially with Windows
  • Tor is not safe to use when torrenting (see the Best VPNs for Torrenting guide)
  • Tor was created by the US government and is still funded largely by US government grants
  • Some consider Tor to be compromised

Ultimately, like all privacy tools, Tor has both pros and cons.

While the Tor network has issues, you can still use the Tor browser with a virtual private network (VPN) and the Tor network disabled.

Tor browser with a VPN (Tor network disabled)

Some people like to use the Tor browser with a VPN (Tor network disabled). This gives you the browser fingerprinting protections of the Tor browser, with the speed and anonymity offered through a VPN.

Disclaimer – While this may be good for some users, it comes with the risks of misconfiguring the Tor browser bundle, which could de-anonymize the user (if you are relying only on the Tor network for anonymity).

Here’s how to download the Tor browser and disable the Tor network:

  1. Download the Tor browser for your operating system. After downloading, you should be prompted to connect to the Tor network, which you can do to get access to the settings.
  2. In the Tor browser go to the Menu button (three lines in the top right corner) and then select Options (Windows) or Preferences (Mac OS).
  3. Select Advanced > Network > Settings 
  4. Select No proxy > OK 
  5. Type about:config into the URL bar and hit the enter/return key. You will get some kind of warning message (“This might void your warranty!”) – just click continue or “I accept the risk!”.
  6. In the search box enter network.proxy.socks_remote_dns and then double click to disable; value = false
  7. To completely disable the Tor network, go to the search box again and enter extensions.torlauncher.start_tor and then double click to disable; value = false
  8. To ensure these changes don’t revert to the default settings when you close out the browser you need to disable TorLauncher. To do this go to Options > Add-ons > TorLauncher [Disable] and then restart the browser for the changes to be implemented.

You will need to restart the Tor browser for the changes to take effect.

Now, when you open the Tor browser, it will not connect through the Tor network. This will prompt a warning screen (“Something Went Wrong”), which you can just ignore.

Be sure to remember that your Tor browser is not configured to work with the Tor network, so it is now just like any other browser.

5. Don’t use smartphones

As we’ve covered before on Restore Privacy, every “smart” device is a data collection tool for corporate entities (and their surveillance partners).

Smartphones are especially vulnerable to browser fingerprinting. A team of researchers at Cambridge published a paper highlighting how smartphones can be fingerprinted using internal sensors – and there’s nothing the user can do about it.

The paper delves into the technical details, but here’s a brief overview of their findings:

  • The attack can be launched by any website you visit or any app you use on a vulnerable device without requiring any explicit confirmation or consent from you.
  • The attack takes less than one second to generate a fingerprint.
  • The attack can generate a globally unique fingerprint for iOS devices.
  • The calibration fingerprint never changes, even after a factory reset.
  • The attack provides an effective means to track you as you browse across the web and move between apps on your phone.

Unfortunately, there’s nothing you can do about this attack – short of getting rid of your smartphone – and you are entirely dependent on the company to fix the problem with software updates. While Apple has apparently patched this attack vector with iOS 12.2, Google (Android) is still “investigating” the issue and has not fixed anything.

If you were thinking about ditching the “smart” phone, this research provides yet another reason to do it.

Use a VPN

Although a VPN won’t protect you against browser fingerprinting, it is a very important privacy tool to conceal your IP address, hide your location, and keep your data safe.

If you’re not using a good VPN, your internet provider can easily monitor all your online activity by recording your DNS requests. In many countries, such as the UK and Australia, this is mandatory. Internet providers in the US can also monitor and record their users, and since March 2017, they can also sell this information to third parties (advertisers).

how vpn works
A VPN will encrypt, secure, and anonymize your internet traffic, while also unblocking content from anywhere in the world.

Going through all the hassle to protect yourself against browser fingerprinting may be a waste of time if you aren’t using a good VPN that will encrypt your internet connection and hide your IP address and location. The best VPN services report discusses the top recommendations based on the latest results.

For those who are seeking a higher level of online anonymity, you can also use a multi-hop VPN, which will encrypt your traffic across more than one server (multiple hops) before exiting onto the regular internet. Both Perfect Privacy and ZorroVPN offer self-configurable multi-hop VPN configurations.

As mentioned above, combining VPNs also adds additional privacy and security while distributing trust across different VPN providers.

Conclusion on browser fingerprinting

While browser fingerprinting may seem like a daunting issue to some, mitigating your browser fingerprint is relatively easy. For those seeking the highest levels of privacy and security, I’d recommend utilizing virtual machines and perhaps chaining different VPN services (using more than one VPN at the same time).

As a general rule of thumb, Firefox remains a great all-around browser after some modifications and configuration. The secure browsers guide also discusses various options, while the Firefox privacy modifications guide takes a deep-dive into tweaks, extensions, and custom configuration.

Another issue to consider, which was not mentioned in this guide, is using a good ad blocker. Ads today basically function as tracking – they record your browsing habits so you can be hit with targeted advertisements. A good add-on is uBlock Origin, but there are other recommendations in the ad blocker article and privacy tools guide.

Stay safe, secure, and private online!

Sven Taylor

About Sven Taylor

Sven Taylor is the founder of Restore Privacy. With a passion for digital privacy and online freedom, he created this website to provide you with honest, useful, and up-to-date information about online privacy, security, and related topics. His focus is on privacy research, writing guides, testing privacy tools, and website admin.

Reader Interactions

Comments

  1. AvatarRobby

    November 27, 2020

    While I use my own PC for day to day activies on the Web, when I want to hide my identity for searches or any activity that does not require me to login somewhere, I use the public library as do many other people that day. Any searches I do there are never duplicated on my home PC so that should prevent any connection via a unique search phrase/subject. Not convienent for some people but for me it’s added privacy, until they ban annoymous use of any PC so everyone can be tracked and profiled. Aslo never used a smartphone and never will.

    Reply
  2. Avatarornithorhynchus

    November 25, 2020

    Unique can be cool.
    Please correct me if I am wrong.
    Method of testing fingerprint using various sites, I use http://www.deviceinfo.me, Panopticlick and amiunique.org.
    1 On the first run I get an unique result. I take down all the relevant data
    2 Restart the browser (firefox). Repeat the first test. Unique again. Take down data again.
    3 Compare data between the 2 runs noting any readings that are the same.
    4 Reboot PC
    5 Redo steps 1 to 3
    6 Wait 24 hours and rerun all steps again.
    7 Compare data from all test runs.. If there is any common data points investigate methods of mitigation.
    If all tests appear unique on all test runs I am happy that very little data is not being spoofed / blocked by my VPN / plugins.

    Reply
  3. AvatarRichard Buckley

    November 25, 2020

    Concerning the about:config changes you recommended, you made no reference to the fact that making these changes could break a lot of websites. Most of these settings have been implemented during the first few years of web browsers and use of the internet without creating a problem though I do understand the normal configuration lends to easily allow tracking. Novice users making changes here could end up with having a lot of trouble especially where income and jobs are concerned as some would not back up the profiles beforehand or make notes on these changes to refer back to, nor bookmark this page and be able to return to it for help.
    Reference to this fact should be made first and in bold lettering immediately under “1. Browser modifications and tweaks”.

    Reply
  4. Avatarrainier

    October 23, 2020

    Hi!
    “ If you were thinking about ditching the “smart” phone, this research provides yet another reason to do it.”. Quoting Sven from above.
    Hypothetical scenario!
    So you and I are driving across the Brooklyn Bridge, in NY. You say “ ditch the crazy iPhone. We will stop in Manhattan and pick up what you need.” So I throw the $800 iPhone in the East River while driving. I feel safer!! Yay!!!
    So, where do we go and what do we get
    when we drive into Manhattan? In this hypothetical, say we have two hours!
    I could have asked you before I threw my phone over the bridge what you use, I imagine it’s Tecnical with dongles and such. Maybe not!
    Regardless, there is value I feel in the question!
    Best to you all !
    Caveat: Before the phone started swimming with the fish, I used it everyday, for email, research, Twitter. Four hours a day. Minimum.

    Reply
    • AvatarRosemary's baby

      November 14, 2020

      Android has mostly been open to users making the phones they buy actually their own (by root).
      Apple on the other has mostly discouraged this with users and their phones (jail breaking).
      Holy cr_p batman (rainier) Sir what else could there possibly be for something that gets more attention and use in our life to pose such a risk for us.
      That is, if we have one…we surely have the other.

      Look into this privacy attempted company/group/purpose and it seems more than merely phones and laptops they are trying to cover in your privacy. [https://puri.sm/]
      This is something I would try (same group as above) – Librem One is a growing bundle of ethical services. If your tired of your digital life being exploited online that is!
      [https://librem.one/]

      I briefly looked at their phone and laptops noticing the way and structure as the route to get at what they are to claim within modern web workings and these modern devices we use. They basically (as I understood), use kill switches and I envisioned a Frankenstein of a device then as it seemed like it required some hardware’s KS used and not just in software.
      To me they mentioned some hardware that’s needed or required inside all modern devices for them to even work online/cellular. In that of each piece of hardware installed to a device there was required a kill switch to restrict that one piece of hardware to satisfy their claims of privacy (ex: more than one not over 4 kill switches – escapes me exactly).
      Maybe it’s not that bad and if you dug in to it relating what other routes don’t work. Could prove interesting not only are the KS needed to pull off your privacy but it works like a beautiful marriage.

      Moral here don’t give up. Restrict all you can till the day comes it’s law and life in your digital worlds privacy is respected.

      Reply
  5. AvatarWhonix

    September 29, 2020

    For all those people who need Tor browser without Tor networking-
    https://www.whonix.org/wiki/SecBrowser

    Reply
  6. AvatarTor10.0 NetworkDisabled

    September 28, 2020

    (Updated for version 10.)

    The following instructions are not copyrighted.

    Since version 9.0, the Tor network cannot be permanently disabled in about:config because these options reset after restarting firefox.exe:
    network.proxy.socks_remote_dns
    network.proxy.type

    https://developer.mozilla.org/en-US/docs/Mozilla/Preferences/Mozilla_networking_preferences

    ____________________________________________________________________________________________
    ____________________________________________________________________________________________
    ____________________________________________________________________________________________
    ____________________________________________________________________________________________

    The Paste method is easier for multiple installations.

    ____________________________________________________________________________________________

    The Bat/Bash method is faster for a few installations.

    But since version 10.0, the Tor network cannot be disabled with this combination:
    export/set TOR_SKIP_LAUNCH=1
    export/set TOR_TRANSPROXY=1

    Neither does this combination work:
    export/set TOR_NO_DISPLAY_NETWORK_SETTINGS=1
    export/set TOR_SKIP_CONTROLPORTTEST=1
    export/set TOR_SKIP_LAUNCH=1

    Please reply if you know which environment variables work.

    ____________________________________________________________________________________________
    ____________________________________________________________________________________________
    ____________________________________________________________________________________________
    ____________________________________________________________________________________________

    Paste method

    https://support.mozilla.org/en-US/kb/customizing-firefox-using-autoconfig

    ____________________________________________________________________________________________

    Step 0: Make a copy of Tor Browser and rename it.

    ____________________________________________________________________________________________

    Step 1: Autoconfig.js.

    1a) Paste these 2 lines into your text editor:
    pref(“general.config.filename”, “firefox.cfg”);
    pref(“general.config.obscure_value”, 0);

    ALL USERS: Restoreprivacy.com converts the quotation marks into curly ones. So, replace them with the standard quotation marks.
    ALL USERS: Restoreprivacy.com converts the quotation marks into curly ones. So, replace them with the standard quotation marks.

    WINDOWS USERS: Use an advanced text editor like Notepad++ to convert the newline to LF.
    WINDOWS USERS: Use an advanced text editor like Notepad++ to convert the newline to LF.

    1b) Save the file as (DO NOT SAVE AS .TXT): autoconfig.js

    ____________________________________________________________________________________________

    Step 2: Firefox.cfg.

    2a) Paste these 5 lines into your text editor:
    // IMPORTANT: Start your code on the 2nd line
    lockPref(“extensions.torlauncher.start_tor”, false);
    lockPref(“network.dns.disabled”, false);
    lockPref(“network.proxy.socks_remote_dns”, false);
    lockPref(“network.proxy.type”, 0);

    ALL USERS: Restoreprivacy.com converts the quotation marks into curly ones. So, replace them with the standard quotation marks.
    ALL USERS: Restoreprivacy.com converts the quotation marks into curly ones. So, replace them with the standard quotation marks.

    All users: Converting the newline to LF is optional.

    2b) Save the file as (DO NOT SAVE AS .TXT): firefox.cfg

    ____________________________________________________________________________________________

    Step 3: Paste autoconfig.js and firefox.cfg into the desired Tor directory.

    3a) autoconfig.js:
    Windows or Linux: …\defaults\pref
    MacOS: …/Contents/Resources/defaults/pref

    3b) firefox.cfg:
    Windows or Linux: paste it into the directory of firefox.exe.
    MacOS: …/Contents/Resources

    ____________________________________________________________________________________________

    Step 4: Repeat Step 3 for any other (renamed) Tor directories you want to use without the Tor network.

    ____________________________________________________________________________________________

    To uninstall, remove the 2 files from their filepaths in Step 3.

    ____________________________________________________________________________________________
    ____________________________________________________________________________________________
    ____________________________________________________________________________________________
    ____________________________________________________________________________________________

    Or download here (bat/bash or paste):
    https://anonfiles.com/90Xes2aap4/Tor_Browser_without_Tor_connection_v10_zip

    how to do can i only use tor browser without tor network with vpn faster same browser fingerprint access sites that block the tor network

    Reply
  7. AvatarRick

    September 14, 2020

    Why not to update modifying Tor browser for VPN. I see many users have posted some methods.

    Reply
    • Sven TaylorSven Taylor

      September 14, 2020

      Yep, we’re looking into it.

      Reply
      • AvatarAli

        September 22, 2020

        also a new version of TorBrowser is out and some previous things do not work

        Reply
      • Avatarpost

        September 22, 2020

        dear sir your explanations and teachings on this page is 100 % accurate and true
        but sir the addons trace and chameleon are absolutely useless as they does nothing as I conducted extensive test on many sites.

        also the addon canvas blocker is just 10% good as it just block the domrect ID part of fingerprint. Only The user agent switcher addon is 100% very good as it allow to switch useragent.

        if you want to block your fingerprint totally you have to block the audiocontext fingerprint, font fingerprint, webgl fingerprint(can be disabled manually in firefox), and canvas fingerprint altogether.

        the canvas blocker only falsify the domrect id and the audiocontext fingerprint, webgl fingerprint, font fingerprint and canvas fingerprint all four remain unchanged

        Reply
  8. AvatarFibonacci

    July 28, 2020

    Fingerprinting seems to be the single most challenging aspect of internet security/privacy. Kameleo and Fraudfox sound like some serious tools for combatting the issue. They cost real money.

    Reply
  9. AvatarTor9.0 NetworkDisabled

    July 25, 2020

    Paste method: easier for multiple installations.

    Since 9.0, the Tor network cannot be permanently disabled in about:config because these options reset after restarting firefox.exe:
    network.proxy.socks_remote_dns
    network.proxy.type

    Make a copy of Tor Browser, rename it, and put these files in there.

    https://support.mozilla.org/en-US/kb/customizing-firefox-using-autoconfig
    https://developer.mozilla.org/en-US/docs/Mozilla/Preferences/Mozilla_networking_preferences

    Step 1: Autoconfig.js.

    1a) Paste these 2 lines into your text editor:
    pref(“general.config.filename”, “firefox.cfg”);
    pref(“general.config.obscure_value”, 0);

    ALL USERS: Restoreprivacy.com converts the quotation marks into curly ones. So, replace them with the standard quotation marks.

    Windows users: Use an advanced text editor like Notepad++ to convert the newline into LF.

    1b) Save the file as (DO NOT SAVE AS .TXT): autoconfig.js

    Step 2: Firefox.cfg.

    2a) Paste these 4 lines into your text editor:
    // IMPORTANT: Start your code on the 2nd line
    lockPref(“extensions.torlauncher.start_tor”, false);
    lockPref(“network.proxy.socks_remote_dns”, false);
    lockPref(“network.proxy.type”, 0);

    ALL USERS: Restoreprivacy.com converts the quotation marks into curly ones. So, replace them with the standard quotation marks.

    Windows users: Converting the newline to LF is optional.

    2b) Save the file as (DO NOT SAVE AS .TXT): firefox.cfg

    Step 3: Paste autoconfig.js and firefox.cfg into the desired Tor directory.

    3a) autoconfig.js:
    Windows or Linux: …\defaults\pref
    MacOS: …/Contents/Resources/defaults/pref

    3b) firefox.cfg:
    Windows or Linux: paste it into the directory of firefox.exe.
    MacOS: …/Contents/Resources

    Step 4: Repeat Step 3 for any other (renamed) Tor directories you want to use without the Tor network.

    Or download here:
    1) Make a copy of your Tor Browser.
    2) Rename that copy.
    3) Replace that copy’s files with these:
    [https://anonfiles.com/91i0ldI2o9/Tor_Browser_without_Tor_connection_zip]

    Reply
« Older Comments

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Privacy Setup

  1. Private and secure browser: Modified Firefox or Brave
  2. VPN: NordVPN with [68% off coupon] or Surfshark with [81% off coupon]
  3. Ad blocker: uBlock Origin or AdGuard
  4. Secure email: Mailfence or ProtonMail
  5. Secure Messenger: Signal or Threema
  6. Private search engine: MetaGer or Swisscows
  7. Password manager: NordPass or Bitwarden

Support this Project

Restore Privacy was created to provide you with honest, useful, and up-to-date information about online privacy and security topics. You can support this project through donations, purchasing items through our links (we may earn a commission at no extra cost to you), and sharing this information with others.

You can read our mission here.

Restore Privacy is also on Twitter

COPYRIGHT © 2021 RESTORE PRIVACY, LLC · PRIVACY POLICY · TERMS OF USE · CONTACT · SITEMAP