• 6 Posts
  • 20 Comments
Joined 1 year ago
cake
Cake day: June 2nd, 2023

help-circle











  • This is my personal takeaway as well. The article seems to insinuate that because VPNs by themselves don’t do anything meaningful for privacy, they’re useless. It seems defeatist, since one could take measures to mitigate fingerprinting. But like you said they’re only one of the important parts of maintaining privacy.

    I am not more technically proficient than the average user. I have little experience in hosting anything, let alone hosting something that will tunnel all of my internet usage. I’d rather put my faith in my current provider to take the proper precautions and put more effort into things I feel comfortable with. It seems better to me than trusting an unknown VPS provider, my own skill and/or my awful ISP.









  • Its a modification to an official install of firefox. In firefox you can go into about:config and modify each setting individually. All arkenfox does is set everything for you with a script and you can make an overrides file to tweak their config. See here

    For people who don’t want to tweak I generally recommend librewolf. Its a forked firefox client that has quality of life features and ability to change certain settings within your browser’s settings tab. The only downside of using librewolf is updates can fall behind, which can be a security issue. Their team has been on top of updating though.


  • Its the best browser for privacy that doesn’t use tor. It has the capability of fooling naive scripts but also may have some protection against stronger fingerprinting methods since you blend in with a crowd.

    Personally I prefer arkenfox because I dislike letterboxing, want sync, want to have control over my user overrides. Disabling these things in mullvad will likely make me stand out. IMO if your threat model is that high I would just use tor and a hardened FF or brave for normal use. All individual preferences though.