This is my first post on the forums, so I hope you forgive me for any mistake I make here. I have been playing around with Firefox about:config page and here is what I think we should change about the Firefox tweaks recommendation on the website:
resistFingerprinting and webgl.disable should not go with each other
privacy.resistFingerprinting will attempt to randomize the webgl fingerprint. However, disabling webgl in the first place will ruin this feature and create a unique fingerprint for the browser. I think the suggestion to set webgl.disable to true should be removed from recommendation. You can test it on https://coveryourtracks.eff.org/ without any extensions and see for yourself.
Turning off telemetry
It seems like a lot of telemetry is still set to true in about:config despite of the user’s setting to not send data back to Firefox. I would suggest that we search for “telemetry” in the configuration page and set them all to false.
As it turns out, the keyboard language can be used to fingerprint us as well, especially when someone is using any keyboard other than English (US). I suggest that we go to prefences -> general -> choose your preferred language for displaying pages to exactly as below (how an American would have it and how it is in Tor):
English (United States) [en-us]
Making the fingerprint more Tor-like
The audio context can also be used to fingerprint a user. Setting dom.webaudio.enabled to false will make the audio fingerprint appear as “not available”, exactly how it is on Tor.
Turn off the DNT Header. Tor doesn’t have this enabled by default, so we want to turn it off to blend in better. It is not like this header actually does anything anyways. Go to Preference -> Privacy & Security, change the DNT Header to “Only when firefox is set to block known tracker”. Disable “Tracking content” in enhanced tracking content as well. It is likely that most of us will use uBlockOrigin for this anyways.
Please let me know what you think about my proposed changes. I can make a Github pull request if needed as well
With this setup, so long as you don’t maximize your screen, you will get a non-unique browser fingerprint on https://coveryourtracks.eff.org/ so long as you don’t maximize your browser, as it is nearly identical to Tor.