Browser fingerprinting evasion

Browser fingerprinting is a common technique used to track users. This techniques relies on browser attributes and computes a hashed visitor identifier from them. Unlike cookies and local storage, the fingerprint stays the same in incognito/private mode and even when browser data is purged.

Some libraries are openly available for this purpose, like FingerprintJS https://github.com/fingerprintjs/fingerprintjs

Goal

The goal of this project is to develop and compute a script that modifies the attributes used to compute a hash, such that the user cannot be tracked. This script could typically be used in a VM, to modify the attributes at each boot. The main steps of the project involve:

  1. study existing fingerprinting libraries
  2. list the most commonly used attributes used to compute the hash
  3. analyze which and how these attributes could be modified without altering the user experience
  4. develop a script or a browser extension that automatically modifies these parameters
  5. test the script against libraries identified during phase 1.

Expected outcome

  • source code of the script on our GitLab server
  • 1 blog post
  • 1 poster
  • a project report

Required skills

To start this project you should have some knowledge of scripting in bash or python.

Interested?

Contact us

This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept