ravenheart 6 Posted ... was curious about how others setup their browsers, for instance some of these dns leak sites can get machine info, i.e screen size, hardware platform, etc. For instance if I go to say, jondonym and have it scan me, I can make it green across the board except for 2 items, http session, ( which I've heard is a symptom of vpn usage?) and the other is the authentication - unique i.d, I believe I've heard/read that that one is damn near impossible to get around but not sure, tho I know they are selling something so tests could profile you to see if yer using their product and give false results. What addons does the assembled braintrust use here? what about say , using 2 diff addons that sorta perform the same thing, like ghostery and privacy badger, is there a possible issue with them fighting for control? Quote Share this post Link to post
pr1v 36 Posted ... I agree with zhang888 that if we are going to use a browser without tor and only with vpn then we should use tor browser without tor (disabling "tor launcher" addon and changing network settings) Quote Share this post Link to post
ravenheart 6 Posted ... I agree with zhang888 that if we are going to use a browser without tor and only with vpn then we should use tor browser without tor (disabling "tor launcher" addon and changing network settings) pr1v, hmmm I'd never even considered that option thnx, I always like to tinker around so now off to go find a tutorial on how to change the network settings in tor browser heh. Quote Share this post Link to post
pr1v 36 Posted ... Disable in addons: tor launcher. Network settings: - Use system proxy settings - Uncheck remote dns. Quote Share this post Link to post
ravenheart 6 Posted ... Disable in addons: tor launcher. Network settings: - Use system proxy settings - Uncheck remote dns. pr1v thanks a lot for that, however it's a no workie, is unable to access any network connection, gonna have to investigate further heh, but thanks for the head start..... Quote Share this post Link to post
zhang888 1066 Posted ... You have to disable the launcher and make sure no proxy is defined. This solution works perfectly on all 3 platforms,and is probably the best privacy focused Firefox profile. Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
pr1v 36 Posted ... Yes, sorry. As zhang888 said: no proxy. My mistake (although it works for me with "system proxy settings", it's not for everyone). Quote Share this post Link to post
ravenheart 6 Posted ... thanks guys, yeah for me it needed the "no proxy" option being set..... Quote Share this post Link to post
sir_trackmenot 4 Posted ... What addons does the assembled braintrust use here? what about say , using 2 diff addons that sorta perform the same thing, like ghostery and privacy badger, is there a possible issue with them fighting for control? How far you go depends on how paranoid you are. Most of the browser fingerprinting that goes on relies on JavaScript. Install NoScript and be happy. I recommend removing all of the non-about: links in its whitelist and also turning off iframes, frames, WebGL in its settings. Only whitelist the bare-minimum of sites that you trust. Definitely never anything that might cause leaks and draw attention (Pirate Bay, for example). I also recommend UBlock origin, UMatrix. In UBlock, turn on as many filters as you are comfortable with. All the Disconnect ones, the Anti-Adblock ones and the complete set of social blockers. That blocks most of the third-party trackers completely in their tracks. UMatrix will also do the same job, but I found that some trackers that hide under the same domain as you're visiting (tracking.yahoo.com as an example) so you have to be a bit more selective about whitelisting domains.. UBlock takes care of them for you. In UMatrix, go to a trusted site then open its filters. Select the domain at the top and pull down the '*' entry. Turn off everything and save. Turn on first party CSS and Images. Save again. Now you only load CSS and images from the domain you're visiting. You can whitelist third-party content on domains as you go. It didn't take me long to have the regular list of sites I use sorted out. You might want to whitelist some sites for JavaScript. AirVPN is one. Firefox has a Privacy Settings addon. It adjusts away a lot of privacy and security-related settings. If you like turning on cookies to log into sites then self-destructing cookies can clean out some cruft after a timeout. Be warned this will log you out of a lot of sites if you just leave their window open in the background. HTTPS Everywhere is good to force HTTPS on sites that support it. It uses a policy list to know what sites to force HTTPS on. FlagFox puts an interesting little flag in the URL bar to show where the server you are looking at might be. It is the only one that works on a local database without making requests for every site you visit. If you're paranoid, turn off pdf.js - none of the above addons stop it. If you're even more paranoid, look into something like firejail on Linux or sandboxie on Windows. MacOS has sandboxing too, but I've not bothered to invest in it. I have setup for firejail that uses the --overlay-tmpfs option to make my Firefox instance completely throwaway. Every write goes into RAM. Mixing it with --private completely hides the rest of your system from the browser. You can go a lot further with it. Add an extra layer with a VM. Go all the way to Whonix or Qubes if you want a fully isolated environment that will do its best to prevent information leaks. Or you can use the Tor Browser Bundle and disable the TOR launcher if you want. Be warned there are some zero-days in Firefox that the FBI has been using to target TOR users. They won't disclose them so nobody knows where to begin looking. We can't tell if they are specific to the TBB or in the vanilla Firefox. We don't know if they've been fixed in the latest versions or not. Best guess is they are JavaScript based and still present in the latest firefox version. If the FBI is using zero-days to infect systems it's not too far to stretch to say they got them on the black market for a price and that other criminals also purchased them and are exploiting them. 2 gerdeg and OmniNegro reacted to this Quote Share this post Link to post
OmniNegro 155 Posted ... Start with Firefox.Add these.https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/https://www.eff.org/privacybadgerhttps://www.eff.org/https-everywherehttps://www.requestpolicy.com/https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/https://addons.mozilla.org/en-US/firefox/addon/self-destructing-cookies/https://addons.mozilla.org/en-US/firefox/addon/privacy-settings/ That last one is complicated, but it will help you change settings you would otherwise have to go to about:config to change. 2 go558a83nk and gerdeg reacted to this Quote Hide OmniNegro's signature Hide all signatures Debugging is at least twice as hard as writing the program in the first place.So if you write your code as clever as you can possibly make it, then by definition you are not smart enough to debug it. Share this post Link to post
OpenSourcerer 1435 Posted ... Start with Firefox.Add these.https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/https://www.eff.org/privacybadgerhttps://www.eff.org/https-everywherehttps://www.requestpolicy.com/https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/https://addons.mozilla.org/en-US/firefox/addon/self-destructing-cookies/https://addons.mozilla.org/en-US/firefox/addon/privacy-settings/ That last one is complicated, but it will help you change settings you would otherwise have to go to about:config to change. Actually, several of those addons are difficult to use for most users here. Including NoScript and Request Policy. You might want to post a thread explaining their usage. 2 OmniNegro and gerdeg reacted to this Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
RidersoftheStorm 20 Posted ... Especially Ublock-origin and Umatrix; needs a really good step by step procedure for setup. 3 OpenSourcerer, gerdeg and OmniNegro reacted to this Quote Share this post Link to post
OmniNegro 155 Posted ... Here you are. https://airvpn.org/topic/18229-firefox-extensions-how-to-guides/ Enjoy it. 2 gerdeg and OpenSourcerer reacted to this Quote Hide OmniNegro's signature Hide all signatures Debugging is at least twice as hard as writing the program in the first place.So if you write your code as clever as you can possibly make it, then by definition you are not smart enough to debug it. Share this post Link to post
Thalium 4 Posted ... My two pennies on the discussion..Knowing what you want to achieve is important I think.For instance a vpn on host with guest OS browsing, never logging in using site accounts, not making searches that are personal to me... lets call it a "porn setup". It's not what I use it for (I believe me, but millions wouldn't). It is not anonymous as personal details are available to be found, but only if entered. Say I've had a few beers and want to find songs on youtube to suit my desperate needs I can use this setup and I will get song suggestions based on what I have played. that is all it is. There is no link to me in anyway.On the other hand if your are planning on buying nuclear warheads from Ru, full tor browser might be a good idea.However if you just want to look at porn others would frown upon tor browser non tor routed might work for you. After all, tor browser is just firefox with certain addons and settings.A guest OS on VM over VPN can be very convenient if you want to do more than just browse and at the same time remain anonymous (user dependent) Quote Share this post Link to post