For example, I just found out that my account settings at Verizon Wireless were allowing them to use Header Enhancement (UIDH) adding a unique identifier on every http request I sent. So, if I log in to a site, they can associate the UIDH with my account so next time I’m in browser incognito mode, they already know who I am (or have a good guess).
The only effective approaches that I know of are 1) using Whonix (best in Qubes) to connect via Tor; and 2) using multiple OS-level VMs that connect via different nested VPN chains.
And even then, there are risks from fingerprints that depend on GPU and virtual graphics drivers in VMs.
So when compartmentalization really matters, it's necessary to use different host machines, on different LANs (or at least vLANs).
Using Tor is rather painful, given all the CAPTCHAs. And the learning curve for Qubes is a little steep.
But using multiple VMs with different nested VPN chains is actually quite convenient, once you've set it up. I use a pfSense VM as the gateway router for each VPN service. So creating nested VPN chains is easy: You just create virtual networks of the pfSense VMs, with Linux workspace VMs wherever you like.
With a decent host machine, I can work ~seamlessly as a few low-isolation personas via nested VPN chains, and another few high-isolation personas via nested VPN chains and Whonix instances.
If you want to not be tracked, turn off JavaScript for a start.
Same in Germany, but there they have rotating IP addresses (which is both a pain (hosting) and a blessing (privacy)).
Hmm, although, would MAC address tracking count? That happens here and there (by roughly the same amount in any EU country, as far I can tell, which is not very much), mostly with WiFi captive portals where you sign away your soul in the terms of service. I'm not sure about the legality (hiding GDPR consent in the TOS) but it happens. From experience, I can say that if you find out and you send them a letter with a copy of your ID, they'll happily give you all the data they have on any MAC address you claim.
* ublock origin
* no script
* cookie auto delete plug in, deletes cookies if tab is closed
* (I use also I don't care about cookies for the EU cookies clusterfuck)
* Canvas blocker
* Privacy badger
* Glyph detection blocker
* Decentral eyes
* Privacy settings
* Privacy-Oriented Origin Policy
* WebRTC leak protection
* https everywhere
* I have a browser spoofing plug-in too but don't think it works so well.
Use VPN
use different browsers for different purposes.
use startpage.com instead of google
Here, try your luck:
Does not work so well. Instead of preventing canvas, fonts, browser ID etc., the plug-ins should randomize it.
> As with traditional HTTP cookies, DNS cookies can be used to track users on the web. They have no concept of "first party" or "third party" and can be read across different websites or from a different browser. They can also be used outside the web environment, for instance to track a web conversion which occurs after reading an email but not clicking on a link, or to track a sign-up in a mobile application after viewing a website. They also have application in DDoS mitigation - especially on IPv6 networks.
I am curious what other techniques are in active use to track a user across devices / software...
https://blogs.gartner.com/martin-kihn/how-cross-device-ident...
https://blogs.gartner.com/martin-kihn/how-cross-device-ident...
Here is a study of fingerprinting effectiveness. Not what you wanted but a worthwhile read.
https://medium.com/slido-dev-blog/we-collected-500-000-brows...
So as "Encrypted web traffic now exceeds 90%" [0] I'd guess at least this type of tracking is gone.
These all have cookie/nonreg-based components, and there are plenty that don't rely on reg based data at all.