Popular animated gifs hosting service gfycat.com is shutting down on September 1, 2023 and all hosted content will no longer be accessible at that point.
I expect adblockers will find a way around that. If nothing else, AdNauseam should work, as it tells the site that you clicked all of the ads it’s blocking (making it much harder for them to build a profile on you).
I don’t really understand AdNauseam. Can’t they also not build a profile with a normal ad blocker, but you also completely avoid interacting with the trackers (so better for performance, data usage, etc)?
Yes and no. It’s harder, but even with an adblocker, your internet signature (things like browser size, are you blocking ads, did you send a “do not track” header, etc) is enough to identify you in a lot of cases. AdNauseam goes the opposite direction, instead of hiding your data, it fills their data collection with so much garbage that they’ll have a hard time figuring anything out about you. From what I understand, it doesn’t actually load the ads, just sees where the ad points to, and tells the ad provider that you clicked it while at the same time blocking it. So it would be very slightly worse in terms of performance and data usage compared to uBlock Origin, but not in any noticeable way, since the stuff it sends is much smaller than any actual content.
So at the current moment, is there a way to use TOR browser and route it through Mullvad since TOR Browser would most likely be more anonymous having a larger, more common fingerprint?
Sorry, I meant TOR Browser, as using TOR Browser + Mullvad VPN and default Mullvad DNS with exit and entry nodes in two different countries and cities + anti quantum computer algorithm to prevent MITM and other attacks alongside obfuscation alongside the Wireguard (IPV6 if you can, not every one can) has to be about the most secure setup I can conceive of possibly (only using TAILS could possibly further protect you). Probably overkill, but I like optimizing for the future when attacks become more prevalent in cyber security.
I recommend every one tries Mullvad Browser, but i don’t think it’s the best idea for me and so I went back to TOR Browser.
I was able to get Mullvad and TOR to play nicely together, I couldn’t at first until a reboot I hadn’t noticed I had forgotten to reboot at the time.
Apparently ublcok origin already has filters to send the data like you watched the ad anyway. The more involved they make verification the less profitable it becomes to serve and ad then verify you watched it, so the cat and mouse game always ends up with the mouse winning.
Don’t forget about YouTube! https://www.techradar.com/computing/social-media/youtubes-test-run-of-the-three-strikes-youre-out-policy-against-ad-blockers-seems-like-a-bit-much
I expect adblockers will find a way around that. If nothing else, AdNauseam should work, as it tells the site that you clicked all of the ads it’s blocking (making it much harder for them to build a profile on you).
I don’t really understand AdNauseam. Can’t they also not build a profile with a normal ad blocker, but you also completely avoid interacting with the trackers (so better for performance, data usage, etc)?
Yes and no. It’s harder, but even with an adblocker, your internet signature (things like browser size, are you blocking ads, did you send a “do not track” header, etc) is enough to identify you in a lot of cases. AdNauseam goes the opposite direction, instead of hiding your data, it fills their data collection with so much garbage that they’ll have a hard time figuring anything out about you. From what I understand, it doesn’t actually load the ads, just sees where the ad points to, and tells the ad provider that you clicked it while at the same time blocking it. So it would be very slightly worse in terms of performance and data usage compared to uBlock Origin, but not in any noticeable way, since the stuff it sends is much smaller than any actual content.
Been wondering how they detect how many videos you’ve watched without being logged in.
Cookies can be cleared, IPs can be changed, and if we all use something like the Mullvad Browser fingerprinting will be far more difficult.
I just spin up new virtual machines, with different flavors of linux. They’re all fairly interchangable at this point.
So at the current moment, is there a way to use TOR browser and route it through Mullvad since TOR Browser would most likely be more anonymous having a larger, more common fingerprint?
Do you mean Mullvad VPN or the browser?
Sorry, I meant TOR Browser, as using TOR Browser + Mullvad VPN and default Mullvad DNS with exit and entry nodes in two different countries and cities + anti quantum computer algorithm to prevent MITM and other attacks alongside obfuscation alongside the Wireguard (IPV6 if you can, not every one can) has to be about the most secure setup I can conceive of possibly (only using TAILS could possibly further protect you). Probably overkill, but I like optimizing for the future when attacks become more prevalent in cyber security.
I recommend every one tries Mullvad Browser, but i don’t think it’s the best idea for me and so I went back to TOR Browser.
I was able to get Mullvad and TOR to play nicely together, I couldn’t at first until a reboot I hadn’t noticed I had forgotten to reboot at the time.
Are you routing your Mullvad Browser traffic through TOR?
Apparently ublcok origin already has filters to send the data like you watched the ad anyway. The more involved they make verification the less profitable it becomes to serve and ad then verify you watched it, so the cat and mouse game always ends up with the mouse winning.