Browser anonymity thread

You're just mitigating your browsing history from your ISP to your VPN provider and their ISP. Though their ISP is usually unable to figure out what sites you yourself visited unless the VPN keeps logs or lets a 3rd party keep logs. In the end, what the hell did you achieve by all this? Browsing forums or doing anything that isn't illegal in your country doesn't need a VPN.
Anything hosted in 14 eye countries or countries cooperating with 14 eyes is a scam by default. ProtonVPN is among those countries, so you yourself are fucked already. And you should never trust a free proprietary service with your data.
Your actual privacy still depends on your browser being configured in a way that it's not fingerprintable, so you must use Firefox or something based on it, using a properly configured user.js, along with uBO and blocking js by default. You should also block the domains of Google, Facebook, Cloudflare and Microsoft.

VPNs are a scam because they promise a lot, but actually deliver very, VERY little. Anything they shill they can do you can achieve for free using Tor (or Tribler for torrents) and remain actually anonymous unless you fuck up.

restoreprivacy.com/5-eyes-9-eyes-14-eyes/
restoreprivacy.com/vpn-logs-lies/


If you have a 1200p+ screen then sure.
The way resolution spoofing works is by telling the website that your browser window size = your resolution. Anyone with a 1080p or lower resolution is forced to use 768p or 700p if they want to spoof the resolution. Tor uses the 1000x700 resolution because it's small enough to fit your desktop space on a large majority of screens no matter where your panel/task bar is. If you're not using Tor then you might as well spoof a 768p or 1080p resolution, whichever you can fit onto your display.
The thing is your browser window size is always readable, no matter if you spoof your resolution or not. This means that if you maximize your window the websites will be able to tell how big your panel/task bar or title bar are. If they cared enough they could use this to figure out which desktop environment you have (if you're on Linux) or which version of windows you have (if you're on windows). People who modify their UI by moving or resizing the panel or title bar are then far easier to fingerprint. Even having the menu bar open reduces your inner window size.

user.js on github or this spyware.neocities.org/guides/firefox.html
Also see this: invidio.us/watch?v=lLessJ4R6w8
You should compartmentalize. He recommends Brave along with Firefox, but you can have 2 separate Firefox instances "installed". Download Firefox from their website and extract the archive into two locations and use each instance separately. Or just use Tor for everything where you aren't actively revealing your identity, and Firefox for everything else.

Is it safe to install Flash in a separate Firefox profile? There is one website I must use that requires flash. Are there risks when a Flash program is not running?

Thanks user. I needed something in addition to Tor so I'm not running naked in the clearnet streets.

No, it's not. Flash player makes your OS vulnerable, not just the browser. invidio.us/watch?v=cyCLMp2rR0c
If it's not running then it's """safe""", but an exploit can be used to silently trigger flash and make you fully vulnerable. You can literally gain full control over an OS using flash player. Don't ever put it on your system, except *maybe* in a VM.

OP is a confirmed LEA nigger
he markets all this meme-shit that doesn't help in privacy, while ignoring Tor Browser and Tor

you don't, nigger. you install Tor Browser which already has that protection

they cannot if you use Tor Browser on Safest setting (disabled javascript)

premium proxies are honeypot and don't protect from anything
you are nigger who sells premium proxies and you want use to buy them from you

also, if they are premium that means you have to pay for them and give them payment info (credit card etc)

they cannot use canvas if you use Tor Browser

DNS tracking doesn't work with Tor Browser, because DNS requests are made on Tor exit node, not locally
webrtc is disabled in Tor Browser

that's not good, that's fucking stupid. you will be the only person using your VPN. and how do you want to pay for VPS without leaking who you are?

reported

Arthur Edelstein
Tor Project
torproject.org

Tor Browser contains those


you can do that and a lot more with Tor Browser
Tor Browser will use different IP for every website you visit. VPN will give you same IP for all websites that you opened

github.com/pyllyukko/user.js/blob/master/user.js

I asked for a base FF config because you shouldn't use Tor for everything you do online. If you do, you're an idiot.

ah, that makes sense. how about fullscreen mode? doesn't that set your resolution to 1920x1080 and resizes only when you access default sized top bar?