You're just mitigating your browsing history from your ISP to your VPN provider and their ISP. Though their ISP is usually unable to figure out what sites you yourself visited unless the VPN keeps logs or lets a 3rd party keep logs. In the end, what the hell did you achieve by all this? Browsing forums or doing anything that isn't illegal in your country doesn't need a VPN. Anything hosted in 14 eye countries or countries cooperating with 14 eyes is a scam by default. ProtonVPN is among those countries, so you yourself are fucked already. And you should never trust a free proprietary service with your data. Your actual privacy still depends on your browser being configured in a way that it's not fingerprintable, so you must use Firefox or something based on it, using a properly configured user.js, along with uBO and blocking js by default. You should also block the domains of Google, Facebook, Cloudflare and Microsoft.
VPNs are a scam because they promise a lot, but actually deliver very, VERY little. Anything they shill they can do you can achieve for free using Tor (or Tribler for torrents) and remain actually anonymous unless you fuck up.
If you have a 1200p+ screen then sure. The way resolution spoofing works is by telling the website that your browser window size = your resolution. Anyone with a 1080p or lower resolution is forced to use 768p or 700p if they want to spoof the resolution. Tor uses the 1000x700 resolution because it's small enough to fit your desktop space on a large majority of screens no matter where your panel/task bar is. If you're not using Tor then you might as well spoof a 768p or 1080p resolution, whichever you can fit onto your display. The thing is your browser window size is always readable, no matter if you spoof your resolution or not. This means that if you maximize your window the websites will be able to tell how big your panel/task bar or title bar are. If they cared enough they could use this to figure out which desktop environment you have (if you're on Linux) or which version of windows you have (if you're on windows). People who modify their UI by moving or resizing the panel or title bar are then far easier to fingerprint. Even having the menu bar open reduces your inner window size.
Aiden Walker
user.js on github or this spyware.neocities.org/guides/firefox.html Also see this: invidio.us/watch?v=lLessJ4R6w8 You should compartmentalize. He recommends Brave along with Firefox, but you can have 2 separate Firefox instances "installed". Download Firefox from their website and extract the archive into two locations and use each instance separately. Or just use Tor for everything where you aren't actively revealing your identity, and Firefox for everything else.
Landon Davis
Is it safe to install Flash in a separate Firefox profile? There is one website I must use that requires flash. Are there risks when a Flash program is not running?
Angel Ward
Thanks user. I needed something in addition to Tor so I'm not running naked in the clearnet streets.
Lincoln Edwards
No, it's not. Flash player makes your OS vulnerable, not just the browser. invidio.us/watch?v=cyCLMp2rR0c If it's not running then it's """safe""", but an exploit can be used to silently trigger flash and make you fully vulnerable. You can literally gain full control over an OS using flash player. Don't ever put it on your system, except *maybe* in a VM.
Hudson Brown
OP is a confirmed LEA nigger he markets all this meme-shit that doesn't help in privacy, while ignoring Tor Browser and Tor
you don't, nigger. you install Tor Browser which already has that protection
they cannot if you use Tor Browser on Safest setting (disabled javascript)
premium proxies are honeypot and don't protect from anything you are nigger who sells premium proxies and you want use to buy them from you
also, if they are premium that means you have to pay for them and give them payment info (credit card etc)
they cannot use canvas if you use Tor Browser
DNS tracking doesn't work with Tor Browser, because DNS requests are made on Tor exit node, not locally webrtc is disabled in Tor Browser
that's not good, that's fucking stupid. you will be the only person using your VPN. and how do you want to pay for VPS without leaking who you are?
you can do that and a lot more with Tor Browser Tor Browser will use different IP for every website you visit. VPN will give you same IP for all websites that you opened