|Configuration||Set “Block mode” to “block readout API”.|
The canvas fingerprint of your browser results from your operation system and configuration like installed fonts. It works by exploiting the HTML5 canvas element. When a user visits a website with canvas fingerprinting, their browser is instructed to draw a hidden line of text or 3D graphic that is then converted to a digital token. Little variations in the rendering of the installed graphic drivers and used GPU can be used for the tracking.
Please visit https://browserleaks.com/canvas before you install the add-on.
You can see my setup below, which is analysed from the canvas fingerprint of my browser:
Linux / Fedora / Firefox
Even if I use a user agent switcher, it won’t change anything.
After installing CanvasBlocker you will have a random canvas fingerprint with the default configuration. This isn’t good for your privacy, because an individual unique canvas fingerprint will be like a red light in the log files.
Set the configuration to block readout API. This is the best configuration for your privacy, because you can’t leave a canvas fingerprint. The server log can’t see if you are using no JavaScipt, a text browser or the CanvasBlocker. You can deactivate the checkbox for show messages, too.
This browser is configured correct and don’t have a canvas fingerprint.
I made a liste of some add-ons to increase your security / privacy online: click here for the list!
I will introduce each add-on with an article in my blog and explain how to use it. If you’r missing an important add-on please leave a comment.