On Saturday, March 28, 2020 at 11:23:55 PM UTC+8, [email protected] wrote: > I am looking to lock-down my browser as much as possible. I am going back > and forth between the Tor Browser and straight FF (with Tor-based > suggestions). With the former I use a proxy service as Tor is too slow. I > have also played with Chameleon to spoof the TZ to mimic where I am coming > from.
Hi, I believe that set the pref "privacy.resistFingerprinting" is true in about:config can meet your need. "privacy.resistFingerprinting" is combining several resist-fingerprint patches for Tor Browser, which timezone is spoofed to 'UTC', the Locale is spoofed to en-US and more... The details could be found on https://wiki.mozilla.org/Security/Fingerprinting#Technical_Details, https://wiki.mozilla.org/Security/Tor_Uplift/Tracking > I am using deviceinfo.me to validate what the browser reveals. While it > shows the system time as being the TZ I set in Chameleon, there is a value > called 'Local Time' that seems to show my actual TZ (EST/EDT). It calculates the local time by your IP address, not your browser tell. Most GeoIP databases provide timezone information about IP. -- Tom _______________________________________________ dev-privacy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-privacy
