>>853910 (OP)
https://arthuredelstein.github.io/tordemos/media-query-fingerprint.html
Related.
I also wonder why doesn't Tor browser have protection against resizing it's window or built-in set of default window sizes like maximized browser on windows 7/10 @ 768p or 1080p / OS X 1600p (OS X has weird "full screen" modes) giving the fact that most normies use it that way ignoring the warning even scroll bar width matters, but only can be fingerprinted with javascript.
Or is there a way to fix window size in X-server settings or something like that?
---obligatory 4chan space----
I think this is a proper browser thread. We need to discuss privacy issues on most common browsers and ways to mitigate them instead of screeching "muh boootnet" and installing goynauseam for "muh privacy".
We should address the fact that most web users today are phonecucks and we need to mimic them.
I've also seen a proposal to load all CSS media variables in bulk on Tor mailing list.
Here are some interesting links for those unfamiliar with them:
http://samy.pl/evercookie/
Profiling audio playback capabilities of your computer:
https://audiofingerprint.openwpm.com/
http://ubercookie.robinlinus.com/
Better than panopticlick:
https://browserleaks.com/
Gives more raw data and less meme scores.
Search engines and lots of sites obfuscate links or add tracking data to them, here is deobfuscator for Google/Yandex search results:
https://addons.mozilla.org/en-US/firefox/addon/google-search-link-fix/?src=userprofile
However, I think that Google can even put you on a list as user of this extension since lots of sites have Google analytics and it will see you visiting a link from search results without getting data from tracking obfuscation.
Fun thing is that "Tracking protection" built into Firefox is pure botnet (who would have thought).
First: it sends "suspicious links" to Google and Disconnect Remember that proxy search page for google in Tor browser before duckduckgo became a thing?
Second: it sends "do not track me" http header to websites. You got it right, a website knows when a normie desires not to be tracked.
Third: it acts as poor ad-blocker with outdated malverizing lists from Disconnect.
Then there is such thing as "fraud score", mostly common among people who do webcasino/payment fraud or some shit like that. As you have already guessed, web-casinos have the most advanced ways of automatically detecting their users, they even compare your TCP SYN frame size (unique for different OS-es and kernels) with your browser's UA for example, this is how Windows users (or "smart guys" spoofing their user agent as Windows) with VPN are detected for example, or if your VPN exit has "data center IP" contrary to "residential IP" is a red flag for fraud detection systems too.
I have also noticed that lots of websites either give http 403 error page or straight up reject request (Chinese firewall) when accessing from tor. Does anyone know a way to cope with first use a list of fresh exits not yet included in blocklists those websites usually rely on or automatically refresh circuit until it gets valid answer, but when connection is rejected I somehow can't refresh the circuit, only creating new identity helps.