Randomize Tor Browser Fingerprint
TorBrowser still can be easily fingerprinted:
Do whatever you can to delete your trace (dom storage, html5 storage, cookie, flash cookie, reinstall browser)
check your fingerprint once more from above sites. 99% it will still be same!
Most advertising company loves this kind of static fingerprinting, so they can track their user. , especially by big company like google. I have many clients who experienced opening adwords account then for whatever reason their account is banned for life by google, then they open new account by using all new identity (brand new unrelated browser, new credit card identity with different name, new address, new internet connection, the only difference is using same computer), you know what happend? couple days later this brand new account banned because they know it is old user that they banned before. Sometimes I dont know how can they find out, but as far as I know this guys is really really good when fingerprinting everysingle user they have. the only failproof solution is also using completely new computer or using new virtual computer using VPN provider.
Static fingerprint like this also threatening small privacy browser like torbrowser & jondofox, if big companies feel that this privacy browsers a threat they can just easily blocked all access by this browsers using their fingerprint. User will fell it is browser's bug then change another browser. It happens with opera once. This opera browser was growing fastly couple years ago and it becoming a threat for google chrome growth, so google blocked all access to most google service by opera browser then recommend big 4 browser instead.
Now what happens? opera becomes google's bootlicker. Now they agree whatever google wants them to do. See all opera browser you will notice many google product is there now. Even opera now uses Google's Blink as their engine.
maybe TorBrowser should randomizing some browser data per browser session like using "Firegloves", "Random Agent Spoofer" & "IpFlood" addon? This asddon works by randomizing some browser data such as timezone, screen dimension, useragent, etc.
RAS also send fake "X-Forwarded-For" & "Via" Header (Usually used by transparent proxy to let the sites know the real ip address), if we send this fake header, the site will think that our real ip address is just a transparent proxy server.
Thank you for taking the time to read this.