Jump to content
Not connected, Your IP: 100.24.113.182
larsvontrier

ANSWERED Changing Firefox prefs.js file anonymize browser

Recommended Posts

I have visited an ArchLinux website which shows how to 'harden' firefox web browser so it doesn't leak information which can identify you.
The site is quite eye-opening as it shows all the different ways you can be identified while using Firefox.
And firefox is supposed to be a really secure web browser!
This is the link (archlinux/firefox/privacy) which I hope all firefox users who are on airvpn will take the time to look up.

Anyway I've made most of the changes to anonymize me when using firefox.
My problem is when I got to the Sanitized profiles section.
I am aware I need to make changes to a copied version of 'prefs.js' - but which lines are the incriminating ones which show my personal ID?

The page provides a link to a 'fingerprinting'  website (like ipleak.net) which shows that the firefox browser reveals metadata which can identify me by 99.5%.
It allocates a unique ID number to my browser which was the same when I moved from one airvpn server to another.
The link to the site is (fingerprintjs/demo).

Has anyone made a successful change to the prefs.js file? In which case what are the lines that need to be altered?
For Linux users the file is in: ~/.mozilla/firefox/ZZZZZZ1.default-esr directory.
Where ZZZZZZ1 should be replaced with the number generated for your own firefox browser.

In case anyone chooses to follow the archlinux recommendations, on the Disable/Enforce Trusted Recursive Resolver section, I changed 'network.trr.mode' to 3 in 'about:config' but this stopped the browser from accessing sites. 
So as per the recommendation I changed it to '2' - and the browser worked fine.

Does anyone know more about modifying the prefs.js file on firefox browser?
It's startling how many ways a user can be identified despite using a vpn. But at least the archlinux site shows what actions we can take to further anonymize ourselves.
Thank you all for reading.

 

Share this post


Link to post

Related:


» I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

» The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

» If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

» If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

» The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

» Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...