Search the Community
Showing results for tags 'extensions'.
Found 2 results
-
https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/ https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/ https://www.eff.org/privacybadger https://www.eff.org/https-everywhere https://www.requestpolicy.com/ https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ https://addons.mozilla.org/en-US/firefox/addon/self-destructing-cookies/ https://addons.mozilla.org/en-US/firefox/addon/privacy-settings/ Three of these have been suggested to need a how to guide. (Including one I did not have in the list for just this reason.) https://airvpn.org/topic/17983-anonymity-and-machine-identification/?do=findComment&comment=43344 First of all is Ublock Origin. It is a classic adblocker that can do much more than most other such extensions. Here is how to configure it. Click the Ublock Origin icon in the browser. (Obviously it is the icon surrounded in green.) That brings this little menu down. Click the title of the menu where it says Ublock Origin. (Again, the green highlight shows where to click in case I am being too unclear.) That brings us to the Ublock Origin Dashboard. Click the "3rd-Party Filters" tab and set it similar to this. You have a lot of options here, but this seems to work everywhere I go on the Internet. Your mileage may vary. Once you change, add, or remove any filters, you will see "apply" in the upper right corner. Click that to save your changes. It will automatically update the filters for you. Now Request Policy and NoScript work almost identically. So I am just providing instructions for Request Policy. Too many sites fail to work as desired with NoScript, so I do not use it most of the time. Lets say you open Random.org and want to see how it works. Like the last few images, the green highlight is around the icon to click for this extension to do what it does best. That brings you to this. It shows you each domain attempting to load content into the page. See the options at the very bottom? Those are the only ones you should ever use unless you are really certain you know what you are doing. If you load a site and the images do not load with the text, or the formatting is all messed up, it is likely because it is being blocked by this. Use the Temporarily Allow option on the very bottom to see if that fixes it. If not, you may have more domains to permit. But be warned not to use the "Allow Requests from" option on any site you are not certain you trust. Temporarily allowing a bad site will usually not be a terrible choice, but if you set it to allow them without using the temporary option, you will have to hope the site does not mess things up that you cannot fix, and it will remember all but the temporary permissions assigned here next time you load the browser too. Be warned in advance that some sites will have dozens of sites they attempt to load content from. These are almost always clickbait sites, and if you see one like that, you should close that tab and never go back. NoScript works almost the same, except it only prevents sites from using javascript. Questions? Ask away.
-
Hello. The purpose of this thread is to allow everyone to make themselves less visible on the Internet by having the same exact set of extensions and addons that help form the browser fingerprint as recognized by Panopticlick. https://panopticlick.eff.org/ So first we should look at what Panopticlick finds. Disregard the "number of bits" and instead look at "one in x browsers have this value" and then find the biggest numbers. Usually the "Browser Plugin Details" and "Fonts" are the largest by far. So since there is nothing that can be done to fix the Fonts problem without messing up the entire system, let's instead focus on the Browser Plugin Details. https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/ https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/ https://addons.mozilla.org/en-US/firefox/addon/classicthemerestorer/ https://addons.mozilla.org/en-US/firefox/addon/disconnect/ https://addons.mozilla.org/en-US/firefox/addon/form-history-control/ https://addons.mozilla.org/en-US/firefox/addon/ghostery/ https://code.google.com/p/https-finder/downloads/detail?name=httpsfinder_0.91b.xpi https://www.eff.org/https-everywhere https://addons.mozilla.org/en-US/firefox/addon/no-google-analytics/ https://www.eff.org/privacybadger https://addons.mozilla.org/en-US/firefox/addon/requestpolicy/ https://addons.mozilla.org/en-US/firefox/addon/self-destructing-cookies/ https://addons.mozilla.org/en-us/firefox/addon/ssleuth/ https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ https://secure.informaction.com/download/releases/noscript-2.6.9.32.xpi https://addons.mozilla.org/en-US/firefox/addon/youtube-high-definition/ (The last one is not needed, but it is nice not to have to change the resolution every single time you play a video from Youtube. And getting rid of annotations forever is worth it by itself.) Now. That is the list of extensions I have for this profile. Plugins are still a problem. For plugins Firefox 40+ comes with two that probably should never be disabled. I suggest adding Flash, Silverlight, Unity and VLC Web player. (You get the last by installing Videolan and choosing the option.) All plugins that can be set to "Ask to Activate" should be. Any suggestions to make this more useful and private? (And just to clarify, this thread is identical to another I made on the PIA forums a while back. I still think people should make a unified browser profile to combat malicious sites finding what type of system we use. And I welcome input.)