Software Removal | Brave #649

Closed
opened 2018-12-06 21:37:44 +00:00 by ciampolo · 56 comments
ciampolo commented 2018-12-06 21:37:44 +00:00 (Migrated from github.com)

Description

I saw the other issue but that I didn't have any technical reasoning so I wanted to make a distinct issue. If you think this is wrong then please merge it.

The reason I see people initially added Brave to the list is because of Brave advertising itself as having "fingerprinting protection". The tracking protection is irrelevant since umatrix/ublock are way more mature and feature rich than Braves own one (which is pretty emberassing since those are simple webextensions made by a private person). Also quick remainder that Firefox has working protection against fingerprinting, tracking and zombie cookies which are toggled by just setting flags to true.

If you actually run fingerprinting/zombie scripts on Brave you will realize that it's easier to fingerprint than a stock Google Chrome. This is due to Brave having no relevant amount user base in combiniation with leaking lots of information (fonts, content Size, window decoration size, JS timings, JS audio api, and many more) which (appearently intentionally) does not get fixed (or the devs are incompetent, you decide).

I think people here seem to forget that Brave's purpose is to hijack ads, not to protect you.
Also Brave is a Chromium fork which already should exclude it from the list. A chromium based Browser cannot offer protection against fingerprinting/zombie cookies etc.. Just look at the Tor explanation. And if you don't want to protect against those kind of stuff you can just use Chromium itself. Or even Vivaldi since that one actually has useful features compared to Brave. Vivaldi doesn't try to hijack ads, nor does it advertise itself with blatant lies like Brave does. Also it is EU based, again contrary to Brave. Though obviously neither Brave nor Vivaldi should be on this list.

Honestly you'd be better of using stock Google Chrome (yes Chrome, not Chromium) before you use Brave since Chrome has a much larger user base and does not attempt to provide "fingerprinting protection" while still leaking 90% of fp vectors as Brave does. It heavily undermines the credibility of privacytools in my opinion.

I'd really like to hear techincal reasoning to include Brave, a browser that increases entropy and as thus does the opposite of providing "privacy" on such a privacy-focused list instead of saying "it advertises itself as having fingerprinting protection". Tbh I think the actual objective of Brave is to gain users, fool them into thinking it actually protects them and then sell all the data to the advertisers. You don't need to build in any backdoor into the browser if you can fingerprint them that easily.

## Description I saw the other issue but that I didn't have any technical reasoning so I wanted to make a distinct issue. If you think this is wrong then please merge it. The reason I see people initially added Brave to the list is because of Brave advertising itself as having "fingerprinting protection". The tracking protection is irrelevant since umatrix/ublock are way more mature and feature rich than Braves own one (which is pretty emberassing since those are simple webextensions made by a private person). Also quick remainder that Firefox has working protection against fingerprinting, tracking and zombie cookies which are toggled by just setting flags to true. If you actually run fingerprinting/zombie scripts on Brave you will realize that it's easier to fingerprint than a stock Google Chrome. This is due to Brave having no relevant amount user base in combiniation with leaking lots of information (fonts, content Size, window decoration size, JS timings, JS audio api, and many more) which (appearently intentionally) does not get fixed (or the devs are incompetent, you decide). I think people here seem to forget that Brave's purpose is to hijack ads, not to protect you. Also Brave is a Chromium fork which already should exclude it from the list. A chromium based Browser cannot offer protection against fingerprinting/zombie cookies etc.. Just look at the Tor explanation. And if you don't want to protect against those kind of stuff you can just use Chromium itself. Or even Vivaldi since that one actually has useful features compared to Brave. Vivaldi doesn't try to hijack ads, nor does it advertise itself with blatant lies like Brave does. Also it is EU based, again contrary to Brave. Though obviously neither Brave nor Vivaldi should be on this list. Honestly you'd be better of using stock Google Chrome (yes Chrome, not Chromium) before you use Brave since Chrome has a much larger user base and does not attempt to provide "fingerprinting protection" while still leaking 90% of fp vectors as Brave does. It heavily undermines the credibility of privacytools in my opinion. I'd really like to hear techincal reasoning to include Brave, a browser that increases entropy and as thus does the opposite of providing "privacy" on such a privacy-focused list instead of saying "it advertises itself as having fingerprinting protection". Tbh I think the actual objective of Brave is to gain users, fool them into thinking it actually protects them and then sell all the data to the advertisers. You don't need to build in any backdoor into the browser if you can fingerprint them that easily.
ghost commented 2018-12-07 10:10:16 +00:00 (Migrated from github.com)

If you actually run fingerprinting/zombie scripts on Brave you will realize that it's easier to fingerprint than a stock Google Chrome. This is due to Brave having no relevant amount user base in combiniation with leaking lots of information (fonts, content Size, window decoration size, JS timings, JS audio api, and many more) which (appearently intentionally) does not get fixed (or the devs are incompetent, you decide).

I agree. Leaking things like fonts and the browser info when there's a small user base is very bad. Tor browser with Tor disabled is a better option.

I'd like to hear more opinions. @bbondy could you comment on the fingerprinting issue?

> If you actually run fingerprinting/zombie scripts on Brave you will realize that it's easier to fingerprint than a stock Google Chrome. This is due to Brave having no relevant amount user base in combiniation with leaking lots of information (fonts, content Size, window decoration size, JS timings, JS audio api, and many more) which (appearently intentionally) does not get fixed (or the devs are incompetent, you decide). I agree. Leaking things like fonts __and__ the browser info when there's a small user base is very bad. Tor browser with Tor disabled is a better option. I'd like to hear more opinions. @bbondy could you comment on the fingerprinting issue?
Minds3t commented 2018-12-07 10:38:48 +00:00 (Migrated from github.com)

Can't agree more! I don't get why brave is recommended.

Can't agree more! I don't get why brave is recommended.
bbondy commented 2018-12-07 15:48:57 +00:00 (Migrated from github.com)

There are many misrepresentations in the original post. I'll clarify some of the big ones.

In addition to NoScript, HTTPS Everywhere, Ad Block, Tracking protection, Fingerprinting protection, Tor support, Cookie blocking and more, we've spent a significant amount of time and resources in disabling privacy invasive things in Chromium. Please see the documentation here:
https://github.com/brave/brave-browser/wiki/Deviations-from-Chromium-(features-we-disable-or-remove)

It it's easier to fingerprint than a stock Google Chrome

That isn't true, we disguise ourselves to look like Google Chrome.

I think people here seem to forget that Brave's purpose is to hijack ads

This is a misunderstanding. We block all ads.

There are 2 types of ads we disable by default but allow users to turn on if they'd like to:

  1. Users can opt into enabling browser level ads outside of page content.

  2. If a publisher opts into it, they can also enable the user private ads on their site. In which case, for the users that also opted into it, they would see the ads.

Both of these are off by default. One would do that if they'd like to have user private ads and can earn BAT if they do.

Note that users can also decide to turn on normal ads if they'd like to as well.

while still leaking 90% of fp vectors as Brave does

We have many fingerprinting measures, you can read about it here:
https://github.com/brave/brave-browser/wiki/Fingerprinting-Protection-Mode

This 90% figure seems like a an arbitrary number that was pulled out of thin air though.


Feel free to remove but please do it on the basis of true claims and not misrepresentations.

There are many misrepresentations in the original post. I'll clarify some of the big ones. In addition to NoScript, HTTPS Everywhere, Ad Block, Tracking protection, Fingerprinting protection, Tor support, Cookie blocking and more, we've spent a significant amount of time and resources in disabling privacy invasive things in Chromium. Please see the documentation here: https://github.com/brave/brave-browser/wiki/Deviations-from-Chromium-(features-we-disable-or-remove) > It it's easier to fingerprint than a stock Google Chrome That isn't true, we disguise ourselves to look like Google Chrome. > I think people here seem to forget that Brave's purpose is to hijack ads This is a misunderstanding. We block all ads. There are 2 types of ads we disable by default but allow users to turn on if they'd like to: 1) Users can opt into enabling browser level ads outside of page content. 2) If a publisher opts into it, they can also enable the user private ads on their site. In which case, for the users that also opted into it, they would see the ads. Both of these are off by default. One would do that if they'd like to have user private ads and can earn BAT if they do. Note that users can also decide to turn on normal ads if they'd like to as well. > while still leaking 90% of fp vectors as Brave does We have many fingerprinting measures, you can read about it here: https://github.com/brave/brave-browser/wiki/Fingerprinting-Protection-Mode This 90% figure seems like a an arbitrary number that was pulled out of thin air though. --- Feel free to remove but please do it on the basis of true claims and not misrepresentations.
beerisgood commented 2018-12-08 10:43:35 +00:00 (Migrated from github.com)

@bbondy you talk about chromium and privacy which doesn't work. And you don't remove all Google tracking, right?!

Also every fork of a browser is more unique then the original base. No matter what you do. The only fork which do it, is Tor browser which isn't only a normal fork.

@bbondy you talk about chromium and privacy which doesn't work. And you don't remove all Google tracking, right?! Also every fork of a browser is more unique then the original base. No matter what you do. The only fork which do it, is Tor browser which isn't only a normal fork.
ghost commented 2018-12-08 10:53:37 +00:00 (Migrated from github.com)

chromium and privacy which doesn't work

Why?

> chromium and privacy which doesn't work Why?
beerisgood commented 2018-12-08 11:29:39 +00:00 (Migrated from github.com)

@Shifterovich I said already. Chromium have Google (tracking) stuff included

@Shifterovich I said already. Chromium have Google (tracking) stuff included
ghost commented 2018-12-08 11:39:51 +00:00 (Migrated from github.com)

Why couldn't it be removed?

Why couldn't it be removed?
Atavic commented 2018-12-08 18:51:26 +00:00 (Migrated from github.com)

Network analysis with Fiddler say:

  • Chromium browser connects to Google to check the extensions installed for updates.
  • Also some DNS queries are made when you open Chromium, so Google will know your IP everytime you open the browser.

Here is an old list of these URLs (that lacks the telemetry ones).

Network analysis with Fiddler say: - Chromium browser connects to Google to check the extensions installed for updates. - Also some DNS queries are made when you open Chromium, so Google will know your IP everytime you open the browser. [Here](https://www.reddit.com/r/privacy/comments/386k89/for_those_interested_in_using_chromium_without/crsph8z/) is an old list of these URLs (that lacks the telemetry ones).
Atavic commented 2018-12-08 19:02:55 +00:00 (Migrated from github.com)

Related comment.

Related [comment](https://github.com/nylira/prism-break/issues/169#issuecomment-20043944).
bbondy commented 2018-12-08 19:08:32 +00:00 (Migrated from github.com)

Just wanted to mention Chromium is not immutable and we do a lot of patching and disabled a lot of things. The disabled things are described above in the link. We run a network audit script on each build as part of our CI to make sure nothing new is calling out to Google that we haven't removed. There are dozens of things that we've removed that call out to Google services, these are easier to spot more recently since network annotator information is available for all services with network code.

Just wanted to mention Chromium is not immutable and we do a lot of patching and disabled a lot of things. The disabled things are described above in the link. We run a network audit script on each build as part of our CI to make sure nothing new is calling out to Google that we haven't removed. There are dozens of things that we've removed that call out to Google services, these are easier to spot more recently since network annotator information is available for all services with network code.
ciampolo commented 2018-12-08 21:23:29 +00:00 (Migrated from github.com)

@bbondy
Instead of replying to what you can make up replies to, you should read the whole post and reply to all parts instead of trying to put on band aid because someone points out that Brave's sole intention is to make money and sell user data.

That isn't true, we disguise ourselves to look like Google Chrome.

Which fails miserably. Again maybe read the whole post? Do you do this intentionally or does Brave have the literally worst developers ever?

I said before you stuffed up 10 vectors but leave 490 others open. And from those 490 others you can easily see that someone is using Brave regardless how desperately you try to fake it (look at Braves issue tracker I opened those issues months ago, those got "closed" (some even closed as fixed) but yet I can still abuse most of those vectors in upstream git). And if you know they are using Brave again they are followed more easily than on Chrome since your user base is irrelevant (0.000001% ?)

This is a misunderstanding. We block all ads.

I did not say you weren't I said Braves purpose is to hijack ads (or do you want to tell me that the BAT thing is just a little joke?). I even specifically said in my last sentence (which you clearly intentionally ignored) that if you can fingerprint users that easily you don' need to inject malware/actually hjiack ads or anything. Your users are so easily fingerprintable that it is irrelevant what they do. If Javascript is enabled they lost regardless what as logn as they use Brave. This cannot be a bug seeing the scope of it meaning it is intentional meaning Brave is just a cash grab for Brendan Eich. If it is a bug then the Brave devs are a terrible joke.

 We have many fingerprinting measures, you can read about it here:

So did you read the document yourself? Or do you even know how fingerprinting works? Because what Brave does only can mean that either Braves devs are incompetent trolls (like you), or that Brendan Eich devised Brave as a cash grab after being butthurt about getting fired at Mozilla And now that Firefox eveloved into a Browser that actually can stop fingerprinting/zombie cookies and tracking in a real way I can see how butthurt Mr. Eich has to be. If Brave didn't advertise itself as private/secure Browser everything would be fine because those are blatant lies.

And yes "selling user data" is also by indirectly allowing third parties to track users easier which is exactly what Brave does.

Feel free to remove but please do it on the basis of true claims and not misrepresentations.

Exactly so if you have no clue about the techincal parts then don't talk about it (since you clearly don't know how fingerprinting works). If you do understand it though then stop intentionally spreading lies in order to get much users. Silicon valley workflow (1. Get users, 2. develop product, 3. Monetize Users) is already too late. Go tell that pathetic Mr. Eich.

Seriously whoever uses Brave unironically cannot be helped. Google Chrome has more privacy than Brave.

@bbondy Instead of replying to what you can make up replies to, you should read the whole post and reply to all parts instead of trying to put on band aid because someone points out that Brave's sole intention is to make money and sell user data. > That isn't true, we disguise ourselves to look like Google Chrome. Which fails miserably. Again maybe read the whole post? Do you do this intentionally or does Brave have the literally worst developers ever? I said before you stuffed up 10 vectors but leave 490 others open. And from those 490 others you can easily see that someone is using Brave regardless how desperately you try to fake it (look at Braves issue tracker I opened those issues months ago, those got "closed" (some even closed as fixed) but yet I can still abuse most of those vectors in upstream git). And if you know they are using Brave again **_they are followed more easily than on Chrome_** since your user base is irrelevant (0.000001% ?) > This is a misunderstanding. We block all ads. I did not say you weren't I said Braves purpose is to hijack ads (or do you want to tell me that the BAT thing is just a little joke?). I even specifically said in my last sentence (which you clearly intentionally ignored) that if you can fingerprint users that easily you don' need to inject malware/actually hjiack ads or anything. Your users are so easily fingerprintable that it is irrelevant what they do. If Javascript is enabled they lost regardless what as logn as they use Brave. This cannot be a bug seeing the scope of it meaning it is intentional meaning Brave is just a cash grab for Brendan Eich. If it is a bug then the Brave devs are a terrible joke. > We have many fingerprinting measures, you can read about it here: So did you read the document yourself? Or do you even know how fingerprinting works? Because what Brave does only can mean that either Braves devs are incompetent trolls (like you), or that Brendan Eich devised Brave as a cash grab after being butthurt about getting fired at Mozilla And now that Firefox eveloved into a Browser that actually can stop fingerprinting/zombie cookies and tracking in a real way I can see how butthurt Mr. Eich has to be. If Brave didn't advertise itself as private/secure Browser everything would be fine because those are blatant lies. And yes "selling user data" is also by indirectly allowing third parties to track users easier which is exactly what Brave does. > Feel free to remove but please do it on the basis of true claims and not misrepresentations. Exactly so if you have no clue about the techincal parts then don't talk about it (since you clearly don't know how fingerprinting works). If you do understand it though then stop intentionally spreading lies in order to get much users. Silicon valley workflow (1. Get users, 2. develop product, 3. Monetize Users) is already too late. Go tell that pathetic Mr. Eich. Seriously whoever uses Brave unironically cannot be helped. _**Google Chrome has more privacy than Brave.**_
ciampolo commented 2018-12-08 21:31:57 +00:00 (Migrated from github.com)

Brave should not only be considered harmful seeing how Brave devs react on security issues it should proactively be considered malware. This isn't the first time I see Brave devs seemingly have no clue about fingerprinting vectors at all. And that is just one part of privacy.

Also to debunk your argument of "disguise as Chrome" forever: There are at least multiple vectors that are impossible to stuff up that will always uniquely identify you as Brave no matter what happens. Go try it out. You tell us your devs are so good and you run all those netsniffers during CI and shit but you can't find the vectors that expose Brave as Brave?

Either your devs are incompetent or this is an intentional cash grab i.e : BRAVE IS ADWARE

Brave should not only be considered harmful seeing how Brave devs react on security issues it should proactively be considered malware. This isn't the first time I see Brave devs seemingly have no clue about fingerprinting vectors at all. And that is just one part of privacy. Also to debunk your argument of "disguise as Chrome" forever: There are at least multiple vectors that are impossible to stuff up that will always uniquely identify you as Brave no matter what happens. Go try it out. You tell us your devs are so good and you run all those netsniffers during CI and shit but you can't find the vectors that expose Brave as Brave? Either your devs are incompetent or this is an intentional cash grab i.e : **_BRAVE IS ADWARE_**
bbondy commented 2018-12-08 22:06:06 +00:00 (Migrated from github.com)

Sorry I won't engage with trolling.

I was asked for clarification so I responded above, but somehow the later comments went from questions to personal attacks. If there are any other questions and if they can be asked in a nice way, then I'll be happy to re-engage.

Have a good thread. Wish you guys the best.

Sorry I won't engage with trolling. I was asked for clarification so I responded above, but somehow the later comments went from questions to personal attacks. If there are any other questions and if they can be asked in a nice way, then I'll be happy to re-engage. Have a good thread. Wish you guys the best.
Atavic commented 2018-12-08 22:42:31 +00:00 (Migrated from github.com)

...and that's how discussions fall down.

When devs jump into discussions, good old etiquette should remind anyone not to flame against devs that can put valuable comments here.

...and that's how discussions fall down. When devs jump into discussions, good old etiquette should remind anyone *not to flame against devs that can put valuable comments here*.
Booteille commented 2018-12-09 00:49:41 +00:00 (Migrated from github.com)

Yes, please. Even if you don't agree with someone, stay polite!
No need for personal attacks if you pretend talking about facts.

Yes, please. Even if you don't agree with someone, stay polite! No need for personal attacks if you pretend talking about facts.
ciampolo commented 2018-12-09 01:17:43 +00:00 (Migrated from github.com)

Since I know that Brave devs are terrible (or are told to act terrible) here a very simple explanation of just couple entropy vectors that will always give you away as Brave no matter how much shit you fake

In addition to NoScript, HTTPS Everywhere, Ad Block, Tracking protection, Fingerprinting protection, Tor support, Cookie blocking and more, we've spent a significant amount of time and resources in disabling privacy invasive things in Chromium.

All of those addons change Chromiums behaviour in a certain way which is fingerprintable (and that in multiple ways which are since years live running in the wild). Ad block itself is an entropy vector that coupled with your tracking protection and your "fingerprinting protection" (which leaks terribly) gives you away as Brave. And all of those things combined again gives away another entropy vector in the behaviour of your adware Browser.

I also hope I don't have to explain why using Tor inside Brave is literally the dumbest idea someone can do.

If @bbondy or Mr. Eich have any logical explanation why the paid developers of a product that advertises itself as "fingerprint protecting" fail miserably on its sole selling point then I will gladly and publicly excuse myself in front of everyone everywhere. Also you can gladly remind your boss Mr. Eich that Firefox has killed off more than 90% of the FP vectors succesfully and even overdone theirselves by releasing containers which you will not have access to with Chromium.

Since I know that Brave devs are terrible (or are told to act terrible) here a very simple explanation of just couple entropy vectors that will always give you away as Brave no matter how much shit you fake > In addition to NoScript, HTTPS Everywhere, Ad Block, Tracking protection, Fingerprinting protection, Tor support, Cookie blocking and more, we've spent a significant amount of time and resources in disabling privacy invasive things in Chromium. All of those addons change Chromiums behaviour in a certain way which is fingerprintable (and that in multiple ways which are since years live running in the wild). Ad block itself is an entropy vector that coupled with your tracking protection and your "fingerprinting protection" (which leaks terribly) **gives you away as Brave**. And all of those things combined again gives away another entropy vector in the behaviour of your adware Browser. I also hope I don't have to explain why using Tor inside Brave is literally the dumbest idea someone can do. If @bbondy or Mr. Eich have any logical explanation why the paid developers of a product that advertises itself as "fingerprint protecting" fail miserably on its sole selling point then I will gladly and publicly excuse myself in front of everyone everywhere. Also you can gladly remind your boss Mr. Eich that Firefox has killed off more than 90% of the FP vectors succesfully and even overdone theirselves by releasing containers which you will not have access to with Chromium.
t1011 commented 2018-12-09 05:52:40 +00:00 (Migrated from github.com)

I will agree that Brave is not a place on this list. Perhaps it should be moved to the section "worth mentioning ", but it is better, of course, to remove altogether. But if it is your sponsor and it gives the livelihood of the site, then it makes sense to make a post about it.

I will agree that Brave is not a place on this list. Perhaps it should be moved to the section "worth mentioning ", but it is better, of course, to remove altogether. But if it is your sponsor and it gives the livelihood of the site, then it makes sense to make a post about it.
beerisgood commented 2018-12-09 10:43:36 +00:00 (Migrated from github.com)

@0ndrey No please. We should remove it without any mentioning it's recommend

@0ndrey No please. We should remove it without any mentioning it's recommend
ghost commented 2018-12-09 20:40:05 +00:00 (Migrated from github.com)

I mentioned @bbondy because we have had several discussions about Brave and it would be nice to resolve this matter.

I would appreciate useful discussion. Even if Brave devs are terrible, arguments first and accusations later.

@ciampolo Can you mention some specific vectors by which Brave can be easily identified as Brave? I'd like to hear what @bbondy can tell us about the technical stuff, but for that to happen we need to discuss technical stuff, not accusations.

Either your devs are incompetent or this is an intentional cash grab i.e : BRAVE IS ADWARE

(Note that I'm not denying any of your claims @ciampolo, you may be 100% right, I just want to see the actual arguments before drawing conclusions like that.)


If there is a way to tell that a browser is Brave, that makes it very easy to fingerprint it, assuming there are more things than the browser name leaked -- but it would be very unlikely if nothing else was leaked.

So, if anyone can show a realistically exploitable vector by which Brave can be identified as Brave, we will (likely) remove Brave. Though I'd still like to hear what @bbondy can tell us about that.

I mentioned @bbondy because we have had several discussions about Brave and it would be nice to resolve this matter. I would appreciate useful discussion. Even if Brave devs are terrible, arguments first and accusations later. @ciampolo Can you mention some specific vectors by which Brave can be easily identified as Brave? I'd like to hear what @bbondy can tell us about the technical stuff, *but for that to happen we need to discuss technical stuff*, not accusations. > Either your devs are incompetent or this is an intentional cash grab i.e : ***BRAVE IS ADWARE*** (Note that I'm not denying any of your claims @ciampolo, you may be 100% right, I just want to see the actual arguments before drawing conclusions like that.) --- If there is a way to tell that a browser is Brave, that makes it very easy to fingerprint it, assuming there are more things than the browser name leaked -- but it would be very unlikely if nothing else was leaked. So, if anyone can show a realistically exploitable vector by which Brave can be identified as Brave, we will (likely) remove Brave. Though I'd still like to hear what @bbondy can tell us about that.
ciampolo commented 2018-12-11 13:46:27 +00:00 (Migrated from github.com)

Sorry had been busy.

Even if Brave devs are terrible, arguments first and accusations later.

You are correct though what you cannot know is that I made multiple issues on the Brave repo which got closed as "wontfix" or "resolved" while they either were essential to fp protection, or they weren't actually fixed which initially made me aware of the scam going on.

Assume I am the host Google, and Mr. Eich is the Brave user visiting google.com.
Brave disguises itself as Chrome which actually is fine since it also runs under Webkit/Blink. Problem now is though this:

HTTPS Everywhere, Ad Block, Tracking protection, Cookie blocking and more,

If I, Google, want to specifically know if someone is using Brave i just check for all those addons (which obviously is comparably easy). Imagine how many people on the internet are not running Brave but have the exact same combination of those addons (especially if running supposed Chrome)? I doubt the value goes over 0.00000001% of global internet users. And since Fonts (and other stuff) are still leaked (and remember Brave is for "privacy aware" people) this will uniquely identify anyone that is not running inside a VM (which again would make the purpose of Brave obsolete).

Also since I don't use Brave (as I am not mentally challenged) I cannot say which vectors are still leaked currently and which aren't. But, if you want to be "smart", anyone can check for the list and then compare it to the one of your visitors. And since their "fp protection" addon is unique to Brave it instantly gives you away as Brave.

And yes I didn't think Brave devs would be that dumb but if you look at the issues I opened months ago on their issue trackers you will see yes they actually are that retarded (example: changing TZ, lang etc. to en-US although Mr. Eich has a French IP).

And last thing that bothers me heavily: Mr. Eich, butthurt @bbondy 's boss that got fired off of Mozilla, uses Blink/Webkit. But Webkit can't do shit against zombie cookies. So let's assume Braves FP protection works as well as Firefox (which it never will): Now we are in the situation where you can't fingerprint the user but this leaves another other problem open: The advertising and tracking will still go since the hosts will just first party their shit (which many already do) and everything goes on as if nothing happened (again Firefox blocks this easily with containers).

Also I'd really love to know a single reason for you to keep Brave on the list as I asked previously. At the very least even if we assume Brave was not adware and just a (miserabely failed) pet project by a (butthurt) developer and you look away of all flaws of Brave it is nothing more than a reskinned Chrome. And you wouldn't include Chrome/Chromium on your list would you?

On such a list you should preemptively remove software than add software. This issue just gives me reason to not trust the list. I hope you understand what I am trying to say.

Sorry had been busy. >Even if Brave devs are terrible, arguments first and accusations later. You are correct though what you cannot know is that I made multiple issues on the Brave repo which got closed as "wontfix" or "resolved" while they either were essential to fp protection, or they weren't actually fixed which initially made me aware of the scam going on. Assume I am the host Google, and Mr. Eich is the Brave user visiting google.com. Brave disguises itself as Chrome which actually is fine since it also runs under Webkit/Blink. Problem now is though this: >HTTPS Everywhere, Ad Block, Tracking protection, Cookie blocking and more, If I, Google, want to specifically know if someone is using Brave i just check for all those addons (which obviously is comparably easy). Imagine how many people on the internet are _**not**_ running Brave but have the exact same combination of those addons (especially if running supposed Chrome)? I doubt the value goes over 0.00000001% of global internet users. And since Fonts (and other stuff) are still leaked (and remember Brave is for "privacy aware" people) this will uniquely identify anyone that is not running inside a VM (which again would make the purpose of Brave obsolete). Also since I don't use Brave (as I am not mentally challenged) I cannot say which vectors are still leaked currently and which aren't. But, if you want to be "smart", anyone can check for the list and then compare it to the one of your visitors. And since their "fp protection" addon is unique to Brave it instantly gives you away as Brave. And yes I didn't think Brave devs would be that dumb but if you look at the issues I opened months ago on their issue trackers you will see yes they actually are that retarded (example: changing TZ, lang etc. to en-US although Mr. Eich has a French IP). And last thing that bothers me heavily: Mr. Eich, butthurt @bbondy 's boss that got fired off of Mozilla, uses Blink/Webkit. But Webkit can't do shit against zombie cookies. So let's assume Braves FP protection works as well as Firefox (which it never will): Now we are in the situation where you can't fingerprint the user but this leaves another other problem open: The advertising and tracking will still go since the hosts will just first party their shit (which many already do) and everything goes on as if nothing happened (again Firefox blocks this easily with containers). Also I'd really love to know a single reason for you to keep Brave on the list as I asked previously. At the very least even if we assume Brave was not adware and just a (miserabely failed) pet project by a (butthurt) developer and you look away of all flaws of Brave it is nothing more than a reskinned Chrome. And you wouldn't include Chrome/Chromium on your list would you? On such a list you should preemptively remove software than add software. This issue just gives me reason to not trust the list. I hope you understand what I am trying to say.
ciampolo commented 2018-12-11 13:58:24 +00:00 (Migrated from github.com)

I mean if I pay you however much @bbondy and/or Eich are paying you and you actually add my malware/adware to your site privacytools.io that is a terrible thing to do. Admittingly if it is enough money I can understand OP's position (though you ave some kind of responsibility).

But for Brave, as a commercial software company, this is the most pathetic kind of marketing I have ever seen. Just go write viruses you'd be better off (financially and morally).

I mean if I pay you however much @bbondy and/or Eich are paying you and you actually add my malware/adware to your site privacytools.io that is a terrible thing to do. Admittingly if it is enough money I can understand OP's position (though you ave some kind of responsibility). But for Brave, as a commercial software company, this is the most pathetic kind of marketing I have ever seen. Just go write viruses you'd be better off (financially and morally).
ghost commented 2018-12-11 15:00:00 +00:00 (Migrated from github.com)

What?

if I pay you however much @bbondy and/or Eich are paying you and you actually add my malware/adware to your site privacytools.io

🤔 What? #161

Admittingly if it is enough money I can understand OP's position

You are the OP in this thread.

What? > if I pay you however much @bbondy and/or Eich are paying you and you actually add my malware/adware to your site privacytools.io :thinking: What? #161 > Admittingly if it is enough money I can understand OP's position You are the OP in this thread.
ciampolo commented 2018-12-11 15:11:54 +00:00 (Migrated from github.com)

Well so I answered your question as to how I can uniquely identify Brave as Brave (which makes me suspicious as to why do you want to know this; even if I'd be lying Brave users can still be at least as easily uniquely identified as Google Chrome users which you clearly are aware of) and you still refuse to answer my question as to why keep Brave on the list despite there being obvious privacy/security flaws. Don't you think this is suspicous? The only logical explanation I have is there is money involved.

As I said previously I love being enlightened and I love excusing myself publicly in front of everyone for mistakes I do. Though no one has said anything yet that would make me excuse myself. Why that might be?

You are the OP in this thread.

As you can see I generally only visit other places. Just this Brave listing outraged me enough to actually post it here.

Also I am still waiting for @bbondy to prove any single one of my claims wrong. Which obviously won't happen.

Well so I answered your question as to how I can uniquely identify Brave as Brave (which makes me suspicious as to why do you want to know this; even if I'd be lying Brave users can still be at least as easily uniquely identified as Google Chrome users which you clearly are aware of) and you still refuse to answer my question as to why keep Brave on the list despite there being obvious privacy/security flaws. Don't you think this is suspicous? The only logical explanation I have is there is money involved. As I said previously I love being enlightened and I love excusing myself publicly in front of everyone for mistakes I do. Though no one has said anything yet that would make me excuse myself. Why that might be? >You are the OP in this thread. As you can see I generally only visit other places. Just this Brave listing outraged me enough to actually post it here. Also I am still waiting for @bbondy to prove any single one of my claims wrong. Which obviously won't happen.
ciampolo commented 2018-12-11 15:52:31 +00:00 (Migrated from github.com)

Also just to add @Shifterovich you seem to being aware that Brave leaks information (or at least after this discussion). Can you tell me one good reason why Brave is on the list instead of Ungoogled-Chromium? The latter at least doesn't promises stuff it can't hold nor is it commercially backed.

See where I get the "Brave payed you" thing from? If you can prove me wrong please for the love of god do so and tell me why Brave is (still) on this list; I asked this 5 times now but yet haven't gotten a single answer although I answered every single question I got asked here and nobody could/wants (to) hold an argument against my accusations.

You should at least admit that this is highly suspicious behaviour.

Also just to add @Shifterovich you seem to being aware that Brave leaks information (or at least after this discussion). Can you tell me one good reason why Brave is on the list instead of Ungoogled-Chromium? The latter at least doesn't promises stuff it can't hold nor is it commercially backed. See where I get the "Brave payed you" thing from? If you can prove me wrong please for the love of god do so and tell me why Brave is (still) on this list; I asked this 5 times now but yet haven't gotten a single answer although I answered every single question I got asked here and nobody could/wants (to) hold an argument against my accusations. You should at least admit that this is highly suspicious behaviour.
t1011 commented 2018-12-11 18:20:01 +00:00 (Migrated from github.com)

I am more than sure that DDG is on this list for the same reason as Brave.
I do not know whether the question about DDG was raised here, but there is a clear evidence that this search system is connected with the Russian intelligence services and spying on its users. It kind of hints that a piece of software on the Privacytools.io is paid for for posting on the site.

I am more than sure that DDG is on this list for the same reason as Brave. I do not know whether the question about DDG was raised here, but there is a clear evidence that this search system is connected with the Russian intelligence services and spying on its users. It kind of hints that a piece of software on the Privacytools.io is paid for for posting on the site.
Booteille commented 2018-12-11 18:36:28 +00:00 (Migrated from github.com)

Can we get proof about what everyone is arguing, please? Concerning DDG, links to studies or articles?

Can we get proof about what everyone is arguing, please? Concerning DDG, links to studies or articles?
t1011 commented 2018-12-11 18:50:01 +00:00 (Migrated from github.com)

I'm sure you know how to use search engines and make logical conclusions. Some application developers, for one reason or another, refuse to use DDG in their applications, giving solid arguments: https://www.stoutner.com/new-default-homepage-and-search-engine/
I would like to note that for some countries of the world DDG uses the Yandex engine.
Sat sapienti.

I'm sure you know how to use search engines and make logical conclusions. Some application developers, for one reason or another, refuse to use DDG in their applications, giving solid arguments: https://www.stoutner.com/new-default-homepage-and-search-engine/ I would like to note that for some countries of the world DDG uses the Yandex engine. Sat sapienti.
t1011 commented 2018-12-11 18:53:51 +00:00 (Migrated from github.com)

By the way, I would call the Privacy Browser ideal, unlike the garbage advertised here.

By the way, I would call the Privacy Browser ideal, unlike the garbage advertised here.
Booteille commented 2018-12-11 18:55:36 +00:00 (Migrated from github.com)

I will not pass hours to search something when you say "I know informations about that". If you have informations, share your sources on don't argue something as being the truth.

But you pointed a website showing some interesting arguments and I think it's worth to consider removing DDG. But that's not the topic of this issue and you should create another issue.

I will not pass hours to search something when you say "I know informations about that". If you have informations, share your sources on don't argue something as being the truth. But you pointed a website showing some interesting arguments and I think it's worth to consider removing DDG. But that's not the topic of this issue and you should create another issue.
t1011 commented 2018-12-11 19:03:04 +00:00 (Migrated from github.com)

I'm sorry if I hurt you.

I'm sorry if I hurt you.
ghost commented 2018-12-11 19:58:18 +00:00 (Migrated from github.com)

See where I get the "Brave payed you" thing from? If you can prove me wrong please for the love of god do so and tell me why Brave is (still) on this list

No. This conversation is really annoying. I don't see how anyone can be so dedicated to typing such massive amounts of bullshit.

Haha yes, the devs of the browser I don't even personally like paid me, apparently to remove the browser from this site:

https://github.com/privacytoolsIO/privacytools.io/issues/161
https://github.com/privacytoolsIO/privacytools.io/pull/78#issuecomment-252088621
https://github.com/privacytoolsIO/privacytools.io/pull/78#issuecomment-264501524
https://github.com/privacytoolsIO/privacytools.io/issues/649#issuecomment-445185056

Post technical data. No one has time to read your retarded theories about Brave paying us to add their browser to our site. Writing shit like that tells more about you than you think it does about us. Imagine constantly accusing people of shit and then wondering why no one takes your comments seriously.

Links to the closed issues and examples how Brave can be fingerprinted. Feel free to send your own PoC code, or fingerprinting results.

you still refuse to answer my question as to why keep Brave on the list despite there being obvious privacy/security flaws. Don't you think this is suspicous? The only logical explanation I have is there is money involved.

Then your logical thinking is severely lacking. You can see that I was skeptical of Brave #78 and @privacytoolsIO merged the PR. Though note that people on reddit wanted Brave to be added too.

It's such a pain to read these long discussions arguing about adding Brave and removing Brave, Monero vs Zcash etc.


I installed Brave to do a panopticlick test. Results:

Your browser fingerprint appears to be unique among the 2,828,212 tested in the past 45 days.

Currently, we estimate that your browser has a fingerprint that conveys at least 21.43 bits of identifying information.

I get the same amount of bits of identifying information on my Chrome which I use daily, has uBlock and is very much unique, especially in terms of languages.

And here's my Chrome (again, with my languages etc) in incognito mode:

Currently, we estimate that your browser has a fingerprint that conveys 20.43 bits of identifying information.

Brave in incognito mode: same as Chrome. 20.43 bits.

Chrome with uBlock in incognito mode: 19.85 bits.

Though I'm not sure if me testing it on multiple Browsers didn't affect the database of known values, thus leading to tests done later scoring better.

Testing Brave again didn't change the result from 20.43 though, so it's probably not the case.

Seems like even using just Fingerprintjs2, Chrome with uBlock scored (slightly) better than Brave. @bbondy Could you please comment with this and explain what you do to prevent fingerprinting? Now I mean specifically fingerprintjs2 fingerprinting, since that's the easiest way to do it.

This is obviously very unscientific, since it's just one site, there are other and possibly better sites.

@ciampolo If you want to contribute to this discussion, you could make a table comparing FF without addons, FF with addons, Chrome without addons, Chrome with addons and Brave in and out of incognito mode.

It would also be worth looking at how they protect, say W10 with US settings compared to a highly personalized Linux browser.


You can clearly see that I didn't support adding Brave to the site, neither did some others. Though @privacytoolsIO merged the PR, possibly based on other things such as the reddit community's opinion.

BAT aside, the only ways Brave promises to be better than Chrome is:

  • faster tracker blocking than using extensions
  • fingerprinting protection

The fingerprinting protection seems to be very lacking. @bbondy How exactly is Brave better than Chrome given the test results?


I'd like this conversation to be resolved, which can only be achieved by posting technical data. Not retarded shit like

I'm sorry if I hurt you.

The only logical explanation I have is there is money involved.

@Vincevrp We should update the contributing guidelines to explain how discussions work, since some people seem to be not know that. They're unable of discussing things based on facts and data instead of accusations. I guess I'll start locking threads when they turn into retarded flaming.


@bridiver engaged in #78. Could you or @bbondy explain the results of my small fingerprinting experiment? Is there any actual research proving that your browser is better than Chrome in terms of fingerprinting as you promise? I see that you may have removed some Google stuff from the source, but how is it different from ungoogled chromium?

> See where I get the "Brave payed you" thing from? If you can prove me wrong please for the love of god do so and tell me why Brave is (still) on this list No. This conversation is really annoying. I don't see how anyone can be so dedicated to typing such massive amounts of bullshit. Haha yes, the devs of the browser I don't even personally like paid me, apparently to remove the browser from this site: https://github.com/privacytoolsIO/privacytools.io/issues/161 https://github.com/privacytoolsIO/privacytools.io/pull/78#issuecomment-252088621 https://github.com/privacytoolsIO/privacytools.io/pull/78#issuecomment-264501524 https://github.com/privacytoolsIO/privacytools.io/issues/649#issuecomment-445185056 **Post technical data.** No one has time to read your retarded theories about Brave paying us to add their browser to our site. Writing shit like that tells more about you than you think it does about us. Imagine constantly accusing people of shit and then wondering why no one takes your comments seriously. Links to the closed issues and examples how Brave can be fingerprinted. Feel free to send your own PoC code, or fingerprinting results. > you still refuse to answer my question as to why keep Brave on the list despite there being obvious privacy/security flaws. Don't you think this is suspicous? The only logical explanation I have is there is money involved. Then your logical thinking is severely lacking. You can see that I was skeptical of Brave #78 and @privacytoolsIO merged the PR. Though note that people on reddit wanted Brave to be added too. It's such a pain to read these long discussions arguing about adding Brave and removing Brave, Monero vs Zcash etc. --- I installed Brave to do a panopticlick test. Results: > Your browser fingerprint appears to be unique among the 2,828,212 tested in the past 45 days. > > Currently, we estimate that your browser has a fingerprint that conveys at least **21.43 bits** of identifying information. I get the same amount of bits of identifying information on my Chrome which I use daily, has uBlock and is very much unique, especially in terms of languages. And here's my Chrome (again, with my languages etc) in incognito mode: > Currently, we estimate that your browser has a fingerprint that conveys **20.43 bits** of identifying information. Brave in incognito mode: same as Chrome. 20.43 bits. Chrome with uBlock in incognito mode: 19.85 bits. Though I'm not sure if me testing it on multiple Browsers didn't affect the database of known values, thus leading to tests done later scoring better. Testing Brave again didn't change the result from 20.43 though, so it's probably not the case. **Seems like even using just Fingerprintjs2, Chrome with uBlock scored (slightly) better than Brave.** @bbondy Could you please comment with this and explain what you do to prevent fingerprinting? Now I mean specifically fingerprintjs2 fingerprinting, since that's the easiest way to do it. This is obviously very unscientific, since it's just one site, there are other and possibly better sites. @ciampolo If you want to contribute to this discussion, you could make a table comparing FF without addons, FF with addons, Chrome without addons, Chrome with addons and Brave in and out of incognito mode. It would also be worth looking at how they protect, say W10 with US settings compared to a highly personalized Linux browser. --- You can clearly see that I didn't support adding Brave to the site, neither did some others. Though @privacytoolsIO merged the PR, possibly based on other things such as the reddit community's opinion. BAT aside, the only ways Brave promises to be better than Chrome is: - faster tracker blocking than using extensions - fingerprinting protection The fingerprinting protection seems to be very lacking. @bbondy How exactly is Brave better than Chrome given the test results? --- I'd like this conversation to be resolved, which can only be achieved by posting technical data. Not retarded shit like > I'm sorry if I hurt you. > The only logical explanation I have is there is money involved. @Vincevrp We should update the contributing guidelines to explain how discussions work, since some people seem to be not know that. They're unable of discussing things based on facts and data instead of accusations. I guess I'll start locking threads when they turn into retarded flaming. --- @bridiver engaged in #78. Could you or @bbondy explain the results of my small fingerprinting experiment? Is there any actual research proving that your browser is better than Chrome in terms of fingerprinting as you promise? I see that you may have removed some Google stuff from the source, but how is it different from ungoogled chromium?
diracdeltas commented 2018-12-11 20:14:50 +00:00 (Migrated from github.com)

Hi, I used to work at EFF, not directly on panopticlick but tangentially. Full disclosure I now work at Brave.

The main point I want to note is that Panopticlick is far from a perfect measure of real-world trackability; it is really measuring "how different are you from other people who visit panopticlick.eff.org".

https://github.com/brave/browser-laptop/wiki/Fingerprinting-Protection-Mode#why-does-panopticlickefforg-or-some-other-site-say-that-i-am-fingerprintable has more info about why Brave could look bad in the panopticlick results.

Hi, I used to work at EFF, not directly on panopticlick but tangentially. Full disclosure I now work at Brave. The main point I want to note is that Panopticlick is far from a perfect measure of real-world trackability; it is really measuring "how different are you from other people who visit panopticlick.eff.org". https://github.com/brave/browser-laptop/wiki/Fingerprinting-Protection-Mode#why-does-panopticlickefforg-or-some-other-site-say-that-i-am-fingerprintable has more info about why Brave could look bad in the panopticlick results.
ghost commented 2018-12-11 20:19:52 +00:00 (Migrated from github.com)

That is true. Though note that the easiest way to fingerprint someone is via fingerprintjs2, which seems to be good enough to track Brave browsers.

Regarding that wiki link you sent,

Panopticlick also compares you against old browsers. For instance, if the plurality of Panopticlick visits were from people using Firefox 3 many years ago, then a person using Firefox 3 could appear as not-very-identifiable even though there are extremely few Firefox 3 users on the web in 2017 (or at least one would hope).

This is simply false.

It says: Your browser fingerprint appears to be unique among the 2,828,212 tested in the past 45 days.

Panopticlick does not account for the fact that randomized fingerprint values are an effective way to prevent real-world fingerprinting. For instance, if Brave browser randomized canvas fingerprints on every page request, then it would be impossible for a site to track a specific Brave user across requests using canvas fingerprinting. However, because the randomized values would be unique, Panopticlick would report Brave as being highly canvas-fingerprintable.

This is also wrong. Changing canvas fingerprint on each request is a boolean value for tracking browsers. Combine that with HTTP_ACCEPT and stuff like that and you can very easily track a specific Brave browser.

That is true. Though note that the easiest way to fingerprint someone is via fingerprintjs2, which seems to be good enough to track Brave browsers. Regarding that wiki link you sent, > Panopticlick also compares you against old browsers. For instance, if the plurality of Panopticlick visits were from people using Firefox 3 many years ago, then a person using Firefox 3 could appear as not-very-identifiable even though there are extremely few Firefox 3 users on the web in 2017 (or at least one would hope). This is simply false. It says: Your browser fingerprint appears to be unique among the 2,828,212 tested in the past 45 days. > Panopticlick does not account for the fact that randomized fingerprint values are an effective way to prevent real-world fingerprinting. For instance, if Brave browser randomized canvas fingerprints on every page request, then it would be impossible for a site to track a specific Brave user across requests using canvas fingerprinting. However, because the randomized values would be unique, Panopticlick would report Brave as being highly canvas-fingerprintable. This is also wrong. Changing canvas fingerprint on each request is a boolean value for tracking browsers. Combine that with HTTP_ACCEPT and stuff like that and you can very easily track a specific Brave browser.
ciampolo commented 2018-12-11 20:35:54 +00:00 (Migrated from github.com)

@Shifterovich That is my fault and I excuse myself for it still I hope you understand where I come from since issues like this get to my heart. I do not want(ed) to attack you. You have to understand my position though since I opened the issues over at Braves issue tracker months ago and now I see this.

Though let me be clear I attack everyone who works at Brave with a burning passion (obviously metaphorically), or at least anyone who is aware of this scam which has to be multiple people (including Mr. Eich, @bbondy and that pink haired "security" guy). Again you can't tell me that paid developers fail so miserably at something so "easy". This is your sole selling point and you fail at it miserably.

For the panopticlick test: Now remember that the panopticlick test is one of the worst fingerprinters out there (and ignores lots and lots of entropy values). I (with Firefox under Linux, and some addons that I don't know how they influence the result) get an entropy value of 18.11, though I have resistFingerprinting enabled i.e. I literally just have Tor fingerprint. Admittingly strange though that that gives away ~18 bits of entropy.

Also if you want to be on the safe side you don't just remove Brave from the list but you add a disclaimer saying that using Brave is less private then using stock Google Chrome. Let's help destroy this cash grab product that is abusing users wish for privacy in a way that North Korea could only dream of.

there any actual research proving that your browser is better than Chrome in terms of fingerprinting as you promise?

Obviously there isn't besides them saying it. I said that among my first posts :)

@diracdeltas

Let me guess the next answer will be "Panopticlick is shit". Yes it is shit which makes it even worse since it can identify you without any problem while not even doing the e.g. size "tricks" I showed in Braves issue tracker (which althoug has been closed is still not actually fixed) or using audio api or fonts or whatever else (Panopticlicks way of getting fonts is dated and can be cheated, but they don't even do that).

again @Shifterovich I excuse myself but I hope you understand where I am coming from and why I am so enraged if someone even slightly argues in favour of Brave (or to keep it on a list or sth.). I'd rather trust North Korean government spies than "Brave Software Inc.".

@Shifterovich That is my fault and I excuse myself for it still I hope you understand where I come from since issues like this get to my heart. I do not want(ed) to attack you. You have to understand my position though since I opened the issues over at Braves issue tracker months ago and now I see this. Though let me be clear I attack everyone who works at Brave with a burning passion (obviously metaphorically), or at least anyone who is aware of this scam which has to be multiple people (including Mr. Eich, @bbondy and that pink haired "security" guy). Again you can't tell me that paid developers fail so miserably at something so "easy". This is your sole selling point and you fail at it miserably. For the panopticlick test: Now remember that the panopticlick test is one of the worst fingerprinters out there (and ignores lots and lots of entropy values). I (with Firefox under Linux, and some addons that I don't know how they influence the result) get an entropy value of 18.11, though I have resistFingerprinting enabled i.e. I literally just have Tor fingerprint. Admittingly strange though that that gives away ~18 bits of entropy. Also if you want to be on the safe side you don't just remove Brave from the list but you add a disclaimer saying that using Brave is less private then using stock Google Chrome. Let's help destroy this cash grab product that is abusing users wish for privacy in a way that North Korea could only dream of. >there any actual research proving that your browser is better than Chrome in terms of fingerprinting as you promise? Obviously there isn't besides them saying it. I said that among my first posts :) @diracdeltas Let me guess the next answer will be "Panopticlick is shit". Yes it is shit which makes it even worse since it can identify you without any problem while not even doing the e.g. size "tricks" I showed in Braves issue tracker (which althoug has been closed is still not actually fixed) or using audio api or fonts or whatever else (Panopticlicks way of getting fonts is dated and can be cheated, but they don't even do that). again @Shifterovich I excuse myself but I hope you understand where I am coming from and why I am so enraged if someone even slightly argues in favour of Brave (or to keep it on a list or sth.). I'd rather trust North Korean government spies than "Brave Software Inc.".
ciampolo commented 2018-12-11 20:37:12 +00:00 (Migrated from github.com)

you can very easily track a specific Brave browser.

And now add to the fact the unique addon combination of Brave. As I said in the beginning Brave is easier to fingerprint than a stock Google Chrome and even the Brave employees (indirectly) admit that.

>you can very easily track a specific Brave browser. And now add to the fact the unique addon combination of Brave. As I said in the beginning Brave is easier to fingerprint than a stock Google Chrome and even the Brave employees (indirectly) admit that.
ghost commented 2018-12-11 20:39:36 +00:00 (Migrated from github.com)

It's important to keep in mind that generally the less trackable your browser is, the more unique it is, thus being ... more trackable (using other vectors). It's important to find the right balance. In a way, Windows 10 with Chrome and US settings is the hardest to track using some vectors, since it's so common, but the easiest to track using other vectors.

It's important to keep in mind that generally the less trackable your browser is, the more unique it is, thus being ... more trackable (using other vectors). It's important to find the right balance. In a way, Windows 10 with Chrome and US settings is the hardest to track using some vectors, since it's so common, but the easiest to track using other vectors.
ciampolo commented 2018-12-11 20:41:48 +00:00 (Migrated from github.com)

I agree with you completely but regardless of all this it should be clear by now that you gain nothing by using Brave over stock Google Chrome. Contrary it makes you worse off privacy wise. Do you agree with this @Shifterovich after seeing the results?

For your point: That is the problem I have with resistFingerprinting. Although Germany has the most Firefox users in the western world, I doubt there are many people who actually have resistFingerpinting enabled. That is a huge dilemma that I could not solve yet. The only way to really solve it is to run Firefox inside a Windows 10 VM or sth like that.

I agree with you completely but regardless of all this it should be clear by now that you gain nothing by using Brave over stock Google Chrome. Contrary it makes you worse off privacy wise. Do you agree with this @Shifterovich after seeing the results? For your point: That is the problem I have with resistFingerprinting. Although Germany has the most Firefox users in the western world, I doubt there are many people who actually have resistFingerpinting enabled. That is a huge dilemma that I could not solve yet. The only way to really solve it is to run Firefox inside a Windows 10 VM or sth like that.
ghost commented 2018-12-11 20:47:35 +00:00 (Migrated from github.com)

Please avoid saying things like

Let's help destroy this cash grab product that is abusing users wish for privacy in a way that North Korea could only dream of.

And yes, it's easy to say that Panopticlick is bad. But the claims on Brave's wiki don't make sense. I hope to get answers to my issues with the wiki claims. A project which lies about its features deserves to be mentioned as snake oil, @diracdeltas.

While I like the idea of a private Chromium-based browser, I don't like projects that say things which aren't true.

Please avoid saying things like > Let's help destroy this cash grab product that is abusing users wish for privacy in a way that North Korea could only dream of. And yes, it's easy to say that Panopticlick is bad. But the claims on Brave's wiki don't make sense. I hope to get answers to my issues with the wiki claims. A project which lies about its features deserves to be mentioned as snake oil, @diracdeltas. While I like the idea of a private Chromium-based browser, I don't like projects that say things which aren't true.
ciampolo commented 2018-12-11 20:55:27 +00:00 (Migrated from github.com)

Just to add (because I think I can guess their answers if they even come at all):

Panopticlicks way to fingerprint is terribly dated, it only checks for a few vectors and some of those vectors can easily be bypassed and legitemetly faked with couple lines userscripts. Yet Brave still fails this test appearently even worse than Google Chrome which I didn't even know.

Just to add (because I think I can guess their answers if they even come at all): Panopticlicks way to fingerprint is terribly dated, it only checks for a few vectors and some of those vectors can easily be bypassed and legitemetly faked with couple lines userscripts. Yet Brave still fails this test appearently even worse than Google Chrome which I didn't even know.
ghost commented 2018-12-11 20:58:08 +00:00 (Migrated from github.com)

Panopticlick uses only fingerprintjs2 for the client-side fingerprinting I think.

Panopticlick uses only fingerprintjs2 for the client-side fingerprinting I think.
diracdeltas commented 2018-12-11 21:04:06 +00:00 (Migrated from github.com)

@Shifterovich what part isn't true? are you referring to "Panopticlick also compares you against old browsers. For instance, if the plurality of Panopticlick visits were from people using Firefox 3 many years ago, then a person using Firefox 3 could appear as not-very-identifiable even though there are extremely few Firefox 3 users on the web in 2017 (or at least one would hope)."?

That was true when I wrote the doc a few years ago. If it's no longer true I'm happy to remove it.

@Shifterovich what part isn't true? are you referring to "Panopticlick also compares you against old browsers. For instance, if the plurality of Panopticlick visits were from people using Firefox 3 many years ago, then a person using Firefox 3 could appear as not-very-identifiable even though there are extremely few Firefox 3 users on the web in 2017 (or at least one would hope)."? That was true when I wrote the doc a few years ago. If it's no longer true I'm happy to remove it.
ciampolo commented 2018-12-11 21:07:14 +00:00 (Migrated from github.com)

@diracdeltas maybe you or @bbondy could also give an explanation as to why your Browser advertises iself with "privacy" while having worse "privacy" than stock Google Chrome?

Also the fact that you linked a document while appearently not being aware of the accuracy of its content. Is this a bad troll? @Shifterovich just go remove Brave and add a remark saying that using Brave is worse than using stock Google Chrome.

@diracdeltas maybe you or @bbondy could also give an explanation as to why your Browser advertises iself with "privacy" while having worse "privacy" than stock Google Chrome? Also the fact that you linked a document while appearently not being aware of the accuracy of its content. Is this a bad troll? @Shifterovich just go remove Brave and add a remark saying that using Brave is worse than using stock Google Chrome.
diracdeltas commented 2018-12-11 21:07:15 +00:00 (Migrated from github.com)

Edited https://github.com/brave/browser-laptop/wiki/Fingerprinting-Protection-Mode#why-does-panopticlickefforg-or-some-other-site-say-that-i-am-fingerprintable to clarify that out-of-date bullet point is no longer true.

Happy to accept more constructive feedback like this; hope you all agree that we are basically working toward the same thing here (better privacy on the web).

Edited https://github.com/brave/browser-laptop/wiki/Fingerprinting-Protection-Mode#why-does-panopticlickefforg-or-some-other-site-say-that-i-am-fingerprintable to clarify that out-of-date bullet point is no longer true. Happy to accept more constructive feedback like this; hope you all agree that we are basically working toward the same thing here (better privacy on the web).
ghost commented 2018-12-11 21:08:03 +00:00 (Migrated from github.com)

Yes. That as well as the second paragraph I mentioned (For instance, if Brave browser randomized canvas fingerprints on every page request, then it would be impossible for a site to track a specific Brave user across requests using canvas fingerprinting is very wrong).

Also:

One way to "trick" Panopticlick is to open the site in various Brave session tabs and re-run the fingerprinting test.

This didn't work for me, as I mentioned:

Though I'm not sure if me testing it on multiple Browsers didn't affect the database of known values, thus leading to tests done later scoring better.

Testing Brave again didn't change the result from 20.43 though, so it's probably not the case.

Perhaps this changed as well and they now recognize that you are one user, possibly based on your IP?

Yes. That as well as the second paragraph I mentioned (`For instance, if Brave browser randomized canvas fingerprints on every page request, then it would be impossible for a site to track a specific Brave user across requests using canvas fingerprinting` is very wrong). Also: > One way to "trick" Panopticlick is to open the site in various Brave session tabs and re-run the fingerprinting test. This didn't work for me, as I mentioned: > Though I'm not sure if me testing it on multiple Browsers didn't affect the database of known values, thus leading to tests done later scoring better. > > Testing Brave again didn't change the result from 20.43 though, so it's probably not the case. Perhaps this changed as well and they now recognize that you are one user, possibly based on your IP?
diracdeltas commented 2018-12-11 21:10:44 +00:00 (Migrated from github.com)

@Shifterovich thanks for the info, i will re-test and update the doc if i find the same thing as you.

@ everyone else:

I'm going to cease responding to this discussion because I don't feel like assuming malice on our part (versus just not having enough time to fix all these things as they come up) is productive. (Also I personally do not have strong feelings about whether Brave is listed on privacytools.io)

If you have further feedback we welcome it on our issue trackers.

@Shifterovich thanks for the info, i will re-test and update the doc if i find the same thing as you. @ everyone else: I'm going to cease responding to this discussion because I don't feel like assuming malice on our part (versus just not having enough time to fix all these things as they come up) is productive. (Also I personally do not have strong feelings about whether Brave is listed on privacytools.io) If you have further feedback we welcome it on our issue trackers.
ciampolo commented 2018-12-11 21:12:35 +00:00 (Migrated from github.com)

(versus just not having enough time to fix all these things as they come up)

It has been two years since Brave started (even more), and multiple months since I opened the issues but still they are not fixed. Hell worse the issues have been labeled fixed but they are still exploitable. This is literally malicious intent.

You not responding means you just go into the same path as @bbondy meaning probably your boss told you to stop responding.

@Shifterovich Tell me your analysis of the situation please because for me this only leaves one possible explanation.

it is always the same with Brave developers. You point them at being wrong they "fix" it but then instantly leave the discussion.

> (versus just not having enough time to fix all these things as they come up) It has been two years since Brave started (even more), and multiple months since I opened the issues but still they are not fixed. Hell worse the issues have been labeled fixed but they are still exploitable. This is literally malicious intent. You not responding means you just go into the same path as @bbondy meaning probably your boss told you to stop responding. @Shifterovich Tell me your analysis of the situation please because for me this only leaves one possible explanation. it is always the same with Brave developers. You point them at being wrong they "fix" it but then instantly leave the discussion.
ghost commented 2018-12-11 21:17:27 +00:00 (Migrated from github.com)

Your assumptions of Brave being evil are not helping with them leaving the discussions. If someone said they're rather trust NK govt than me, I'd leave the discussion simply because I have better ways to use my time.

I'd prefer a fact-based discussion where no one accuses anyone of anything and we simply suggest issues with Brave and other people (such as Brave devs) respond.

Your assumptions of Brave being evil are not helping with them leaving the discussions. If someone said they're rather trust NK govt than me, I'd leave the discussion simply because I have better ways to use my time. I'd prefer a fact-based discussion where no one accuses anyone of anything and we simply suggest issues with Brave and other people (such as Brave devs) respond.
ciampolo commented 2018-12-11 21:20:28 +00:00 (Migrated from github.com)

I don't understand your point though. You saw that the only thing @diracdeltas replied to was you requesting to remove something. He didn't reply to your questions though as to whether Brave actually is placebo. Why do you think he did that? Same for @bbondy . He took out what he could reply to in my op and just straight up ignored the rest of it.

I mean how much more proof do you need? And the NK thing comes because this is a psyops marketing scheme. There is no reason to suggest it is not. Brave has been aroudn since 2015 and still is where it was 3 years ago with its fp protection (in a practical sense). Don't you think something's going wrong here? Think yourself Brave Software is a commercial entity that has a specific "privacy" engineer (that pink haired guy). But a company that has someone for that position fails exactly at this point? This isn't coincidence is it? And then Brave/Eich teaming up with multiple advertisers.

We got far you yourself said it is snake oil but now again backed out what is wrong here I really don't get it. Do you think I am a competitor to Brave or why do you want to listen to @bbondy or @diracdeltas after you yourself seeing how terrible Brave is.

I don't understand your point though. You saw that the only thing @diracdeltas replied to was you requesting to remove something. He didn't reply to your questions though as to whether Brave actually is placebo. Why do you think he did that? Same for @bbondy . He took out what he could reply to in my op and just straight up ignored the rest of it. I mean how much more proof do you need? And the NK thing comes because this is a psyops marketing scheme. There is no reason to suggest it is not. Brave has been aroudn since 2015 and still is where it was 3 years ago with its fp protection (in a practical sense). Don't you think something's going wrong here? Think yourself Brave Software is a commercial entity that has a specific "privacy" engineer (that pink haired guy). But a company that has someone for that position fails exactly at this point? This isn't coincidence is it? And then Brave/Eich teaming up with multiple advertisers. We got far you yourself said it is snake oil but now again backed out what is wrong here I really don't get it. Do you think I am a competitor to Brave or why do you want to listen to @bbondy or @diracdeltas after you yourself seeing how terrible Brave is.
ghost commented 2018-12-11 21:22:57 +00:00 (Migrated from github.com)

He didn't reply to your questions though as to whether Brave actually is placebo. Why do you think he did that?

Updating documentation is good, though I'd appreciate if @diracdeltas gave her own explanation rather than linking the wiki, since that could address my concerns. Though again please don't accuse people of random shit if you want them to talk to you.

> He didn't reply to your questions though as to whether Brave actually is placebo. Why do you think he did that? Updating documentation is good, though I'd appreciate if @diracdeltas gave her own explanation rather than linking the wiki, since that could address my concerns. Though again please don't accuse people of random shit if you want them to talk to you.
ciampolo commented 2018-12-11 21:30:32 +00:00 (Migrated from github.com)

So now @diracdeltas deletes my comments without reading them.

See @Shifterovich this is damage control what they are doing. They saw you talking about snake oil and now got scared. What do? Yes remove it ourselves so we don't have to add the disclaimer that Brave is worse than Google Chrome.

So now @diracdeltas deletes my comments without reading them. See @Shifterovich this is damage control what they are doing. They saw you talking about snake oil and now got scared. What do? Yes remove it ourselves so we don't have to add the disclaimer that Brave is worse than Google Chrome.
ghost commented 2018-12-11 21:31:26 +00:00 (Migrated from github.com)

I deleted your comment. And I will address it. #657 will not contain any flame.

I deleted your comment. And I will address it. #657 will not contain any flame.
diracdeltas commented 2018-12-11 21:34:03 +00:00 (Migrated from github.com)

This is also wrong. Changing canvas fingerprint on each request is a boolean value for tracking browsers. Combine that with HTTP_ACCEPT and stuff like that and you can very easily track a specific Brave browser.

I agree with you assuming the browser is already fingerprintable via other methods. However if we are talking about fingerprinting solely using canvas, then I believe this statement is true: " For instance, if Brave browser randomized canvas fingerprints on every page request, then it would be impossible for a site to track a specific Brave user across requests using canvas fingerprinting." [EDIT: i see what you mean about this being a binary flag; but it still seems to me that "this is the same user but their canvas keeps changing" versus "these are two different users" is not distinguishable from each other, unless you have other ways of tracking available to you.]

The intent of the statement was to point out that repeated instances of panopticlick seeing the same value would lead to it calculating a lower entropy for that value. This disincentives developers from using randomization versus a globally-constant value when spoofing canvas fingerprint. (It has come up in discussions with Tor browser too.)

Anyway you are completely fair in pointing out that we haven't been prioritizing looking at our panopticlick results and keeping the doc up to date. I will do some more testing today and open issues as needed.

> This is also wrong. Changing canvas fingerprint on each request is a boolean value for tracking browsers. Combine that with HTTP_ACCEPT and stuff like that and you can very easily track a specific Brave browser. I agree with you assuming the browser is already fingerprintable via other methods. However if we are talking about fingerprinting solely using canvas, then I believe this statement is true: " For instance, if Brave browser randomized canvas fingerprints on every page request, then it would be impossible for a site to track a specific Brave user across requests _using canvas fingerprinting_." [EDIT: i see what you mean about this being a binary flag; but it still seems to me that "this is the same user but their canvas keeps changing" versus "these are two different users" is not distinguishable from each other, unless you have other ways of tracking available to you.] The intent of the statement was to point out that repeated instances of panopticlick seeing the same value would lead to it calculating a lower entropy for that value. This disincentives developers from using randomization versus a globally-constant value when spoofing canvas fingerprint. (It has come up in discussions with Tor browser too.) Anyway you are completely fair in pointing out that we haven't been prioritizing looking at our panopticlick results and keeping the doc up to date. I will do some more testing today and open issues as needed.
ciampolo commented 2018-12-11 21:35:48 +00:00 (Migrated from github.com)

@diracdeltas Now my question how comes that a Browser whose sole selling point is "privacy" fails at it although it has been in developement for more than 2 years?

It is like me saying "I have developed application X that can do functionality Y". Then after 3 years developing people realize that it still can't do functionality Y. Please elaborate why. I said before if you prove me wrong I will gladly excuse myself.

@diracdeltas Now my question how comes that a Browser whose sole selling point is "privacy" fails at it although it has been in developement for more than 2 years? It is like me saying "I have developed application X that can do functionality Y". Then after 3 years developing people realize that it still can't do functionality Y. Please elaborate why. I said before if you prove me wrong I will gladly excuse myself.
ghost commented 2018-12-11 21:36:21 +00:00 (Migrated from github.com)

The intent of the statement was to point out that repeated instances of panopticlick seeing the same value would lead to it calculating a lower entropy for that value

Does Panopticlick just sum the amount of bits of the fields which it considers unique due to reaching a certain threshold of uncommonness, or does it look at the combination of your specific values?

> The intent of the statement was to point out that repeated instances of panopticlick seeing the same value would lead to it calculating a lower entropy for that value Does Panopticlick just sum the amount of bits of the fields which it considers unique due to reaching a certain threshold of uncommonness, or does it look at the _combination_ of your specific values?
ghost commented 2018-12-11 21:37:44 +00:00 (Migrated from github.com)

I'm locking this thread, it's full of nonsense. Let's continue in #657. Though note that I will remove anything but technical information from that thread. We've had enough of threads full of spam.

I'm locking this thread, it's full of nonsense. Let's continue in #657. Though note that I will remove anything but technical information from that thread. We've had enough of threads full of spam.
ghost commented 2018-12-11 21:53:02 +00:00 (Migrated from github.com)

Closing as a duplicate of #161.

Closing as a duplicate of #161.
This repo is archived. You cannot comment on issues.
No Milestone
No Assignees
1 Participants
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: privacyguides/privacytools.io#649
No description provided.