On Saturday, March 28, 2020 at 11:23:55 PM UTC+8, [email protected] wrote:
> I am looking to lock-down my browser as much as possible.  I am going back 
> and forth between the Tor Browser and straight FF (with Tor-based 
> suggestions).  With the former I use a proxy service as Tor is too slow.  I 
> have also played with Chameleon to spoof the TZ to mimic where I am coming 
> from. 

Hi, I believe that set the pref "privacy.resistFingerprinting" is true in 
about:config can meet your need. "privacy.resistFingerprinting" is combining 
several resist-fingerprint patches for Tor Browser, which timezone is spoofed 
to 'UTC', the Locale is spoofed to en-US and more... The details could be found 
on https://wiki.mozilla.org/Security/Fingerprinting#Technical_Details, 
https://wiki.mozilla.org/Security/Tor_Uplift/Tracking

> I am using deviceinfo.me to validate what the browser reveals.  While it 
> shows the system time as being the TZ I set in Chameleon, there is a value 
> called 'Local Time' that seems to show my actual TZ (EST/EDT).

It calculates the local time by your IP address, not your browser tell. Most 
GeoIP databases provide timezone information about IP.

-- 
Tom
_______________________________________________
dev-privacy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-privacy

Reply via email to