Firefox expands fingerprint protections

Add-ons, Breakage, and Usability Tradeoffs

  • Several commenters run heavy privacy stacks (NoScript/uMatrix, CanvasBlocker, Decentraleyes, uBlock Origin, Temporary Containers, etc.).
  • Common pattern: most sites work, but video, payments, and JS-heavy docs often need manual whitelisting; some resort to a “if it breaks I don’t need it” mindset or fall back to Chrome for one-off sites.
  • JS-required documentation and Cloudflare “unblock challenges.cloudflare.com” walls are particular pain points.

Do Privacy Add-ons Increase Fingerprint Uniqueness?

  • One camp argues extra extensions add entropy (unique combo of blockers, JS/CSS disabled, canvas behavior), making users more trackable; Tor explicitly warns against extra extensions.
  • Others counter that blocking third-party scripts/hosts removes major tracking vectors and that many fingerprinting methods (fonts, TLS, network behavior) exist regardless.
  • Disagreement over NoScript vs uBlock: some say uBlock in advanced mode makes NoScript redundant and fewer extensions are better; others report NoScript measurably improves their fingerprint “commonness” in tests.

Canvas Noise and Developer Concerns

  • Adding noise to canvas/image data is seen by some as dangerous: could corrupt web photo editors or any JS image processing.
  • Firefox ties this to “Suspected Fingerprinters” / ETP, but there’s confusion over the granularity of per-site controls.

Effectiveness of Firefox’s Fingerprinting Protections

  • Mixed reports from fingerprint.com tests: older resistFingerprinting used to change hashes per restart; newer behavior sometimes yields stable hashes, implying trackers have improved heuristics.
  • Some note that even identical browser fingerprints don’t hide network-level differences (TLS, routing, behavior).
  • Others insist partial defenses still matter: making tracking more costly and less reliable, even if impossible to fully defeat.

Ethics, Threat Models, and Analogies

  • Motivations differ: some want to avoid ads/marketing; others worry about broad surveillance and data aggregation.
  • Multiple commenters reject the “it’s just like a shopkeeper recognizing you” analogy, stressing:
    • scale (billions, not dozens),
    • cross-site/cross-company correlation,
    • hidden/automated nature,
    • potential harms and secondary uses.

Browser Market Share and Ecosystem Power

  • Firefox’s small share makes its users easier to isolate statistically, even with protections.
  • Debate over Chromium forks: convenient and feature-rich but seen as reinforcing Google’s control of web standards; some argue independent engines (Gecko, WebKit) are needed to counter this.

Containers, Profiles, and Isolation Strategies

  • Profiles and container extensions (Multi-Account Containers, Temporary Containers, Auto Containers, Cookie AutoDelete) are popular for compartmentalizing login states and reducing cross-site tracking.
  • “Every-tab-new-container” approaches can significantly disrupt tracking but often break logins and require per-site tuning.

CAPTCHAs, Cloudflare, and Publisher Behavior

  • Strong fingerprinting resistance (and VPNs) can break Cloudflare and similar bot checks; some users report unsolvable CAPTCHAs.
  • Example: NYTimes repeatedly flagging a paying user as a bot, leading to canceled subscriptions or paywall workarounds.

Firefox Features and Configuration Friction

  • Some dislike Firefox’s new AI/ML UI elements and want simpler, non-intrusive controls; others note they can be hidden via settings or toolbar/context menus, but discoverability is poor.
  • Letterboxing and resistFingerprinting help standardize viewport/canvas size, but at least one user finds their unusual layout still yields a unique canvas.