Thanks for the link. Brave and its creator have a messy history, bu the browser can be made fairly private by spoofing the UA, setting shields high, and then allowing standard-level shields for the sites which need them.
[https://coveryourtracks.eff.org/] shows my instance of Brave with "strong protection against Web tracking*, with good ratings for all 3 issues in the short table. My User Agent string reports generic Google Chrome Linux. EFF shows this string matching 1 in 84 browser page requests, thatâs probably the highest you can get from Linux_x86_64 without presenting the wrong video API.
EFF gives me a passing score, but shows issues which a web tracker site could use to identify âmy browserâ in a nearly unique way:
- My system fonts. A vicious tracker with permission to actually display elements can use javascript to show spans for a lot of different and specific fonts, then detecting âsystem fontsâ which ARE available by using the elementâs resulting size. My set of detectable fonts is matched by only 1: 14,860 other browser visits, thatâs not good.
- In the test for tracker-inspectable DOM data, my browser was not unique at all. (1:1.14 ratio.) Maybe nothing was sent back, but I should still try to removed some kinds of DOM storage use which Brave allows.
- My âWebGLâ and âCanvasâ fingerprints leaked nothing, but Javascript still includes a query for âWebGL Vendor & Rendererâ, and my systemâs response is almost totally unique. The EFF test estimates than only 1:38,000 browsers will provide the response which I did. (I have an Intel ARC dekstop card, hardly anyone uses those.)
Between my font list and my leaking video card details, my computerâs standard web browser" is almost uniquely identified. The reported browser window size is also nearly unique (1:89,000) but Iâm always changing that on the fly. Any trackers who do use that, and there might be a lot of them, will create worse information about âmeâ than they would have by ignoring it.
Iâm glad to see and hear that I made a good initial choice! I moved away from Brave due to the Manifest V3 thing from Chromium browsers. I chose LibreWolf because itâs a privacy-focused Firefox fork. It looks like I have no regrets so far!
The âcryptoâ crap can be disabled pretty easily: First, within âshieldsâ and âWeb V3â, blacklist the features for all websites. Then destroy (erase) your current wallet.
The use of derivative browsers introduces a reliability and risk factor at the moment you use a sync account for bookmarks, history, âŚ
For example, in Librewolf if you want to use the bookmark synchronization, you must log in to your Mozilla account and those credentials first go through Librewolf before reaching Mozilla. That is, you are âinvitingâ a third party (Librewolf) into your Mozilla account path.
Firefox can easily be left with a more privacy oriented configuration, similar to Librewolf but without having to use Librewolf.
Just as in Linux I use only major distributions, on the internet I only use major web browsers, not derivatives, so you remove reliability links from the chain.
I switched as well and Iâm currently using Floorp
Iâve seen nothing in Librewolf that suggests they route your account credentials through their own server.
I believe Brave mentioned they will support a selection of MV2 extensions even after the switch. However youâd have to deal with Brave, which is bloated with junk like their crypto coin wallet.
Just a few words: manifest V3
So yeah, Firefox it is for me, nevertheless
In this video, Drew of Just a Guy Linux demonstrates adding a custom settings profile to clean up Firefox.
A Better Firefox!