||Set “Block mode” to “block readout API”.
The canvas fingerprint of your browser results from your operation system and configuration like installed fonts. It works by exploiting the HTML5 canvas element. When a user visits a website with canvas fingerprinting, their browser is instructed to draw a hidden line of text or 3D graphic that is then converted to a digital token. Little variations in the rendering of the installed graphic drivers and used GPU can be used for the tracking.
Please visit https://browserleaks.com/canvas before you install the add-on.
You can see my setup below, which is analysed from the canvas fingerprint of my browser:
Linux / Fedora / Firefox
Canvas fingerprint with browser and OS information …
Even if I use a user agent switcher, it won’t change anything.
After installing CanvasBlocker you will have a random canvas fingerprint with the default configuration. This isn’t good for your privacy, because an individual unique canvas fingerprint will be like a red light in the log files.
Set the configuration to block readout API. This is the best configuration for your privacy, because you can’t leave a canvas fingerprint. The server log can’t see if you are using no JavaScipt, a text browser or the CanvasBlocker. You can deactivate the checkbox for show messages, too.
configuration Canvas add-on – block readout API …
This browser is configured correct and don’t have a canvas fingerprint.
Canvas fingerprint disabled for privacy …
I made a liste of some add-ons to increase your security / privacy online: click here for the list!
I will introduce each add-on with an article in my blog and explain how to use it. If you’r missing an important add-on please leave a comment.
On basic principle of the hacker ethic is decentralization. So please don’t use all the same server. Only one server can easily be monitored or censored, by taking down the server.
Here is a list of xmpp servers, which can be also accessed via the Onion:
You can find me at anonymiss (at) creep.im if you want …
If you know more servers, please write a comment!
[UPDATE] 2017-03-19 – Added some new servers to the list. My thanks are going to the readers for their input.
[UPDATE] 2017-03-26 – Added two new servers: metalgamer.eu and jabjab.de. Thanks for the input.
[UPDATE] 2017-05-21 – Added a new servers: evil.im. Thanks for the input.
I want to point out, that through the new iPhone finger print scan it is not only detectable from which device something was sent or received, but also from which person it was sent or received.
The next feature will be an included DNA scanner …
I got some questions where to go after leaving Gmail to send real secure and private emails. If you decode my public key then you will see I use an email hosted in the U.S. That’s not really secure because the NSA can get access to this emails and I can’t do anything against it. I also use an Email in the I2P darknet: http://www.i2p2.de ← That’s really secure but the end to end encryption is only inside the I2P network. Most email servers outside I2P in the real Internet refuse emails form I2P – guess why 😦
So the best secure thing is to install your own email server based on open source software at home and use it.
The second best way for beginners is to use an email in Iceland. In Iceland after the Wikileaks scandal and the change of the government, you will get the best privacy in this world. As far as I know there is no secret service in Island like the NSA. They only have a normal police, which is doing the counterintelligence. They only take a look inside your emails if you do criminal thing, which are criminal after law in Island. So whistleblowing will be allowed.
You can use 1984 which is a web company in Island with an English web interface for emails: https://1984hosting.com
Another one is OrangeWebsite, where you can pay with bitcoins: http://www.orangewebsite.com
If you have more suggestions, please let me know in the comments 🙂