Good news for the privacy conscious among us, Mozilla are planning to integrate some Tor privacy settings into Firefox. Take that, you evil snooping government types.
The Tor browser uses Firefox ESR (Extended Support Release), so this move should provide a relatively seamless experience for users.
Even when using a proxy for anonymity, users can still be identified by a method called ‘fingerprinting’, which involves tracking visitors through secondary information such as supercookies, timezone settings, WebGL details, screen size, colour depth and even mouse movements.
When fingerprinting is used in this way, a targets IP address becomes irrelevant.
Thanks to the Ghacks website for making it clear on how to enable the new settings:
- Type about:config in the Firefox address bar.
- Confirm you will be careful.
- The privacy.resistFingerprinting preference does not exist by default.
- Right-click in the main area, and select New > Boolean from the context menu.
- Name the preference privacy.resistFingerprinting.
- Set its value to True to enable it.
You’re going to need Firefox 50, so make sure you’re up to date.