I remember switching from Win95 to NT4.0 just to be able to use SoftICE properly under Windows without all the stability problems, it was an incredible time! SoftICE felt like absolute wizardry at the time.
The real test is whether the site believes you to be unique, which is listed separately. It reports me as "Our tests indicate that you have strong protection against Web tracking.", but I'm still uniquely identifiable.
you can't beat it with a VPN, or any sort of networking only solution, only your browser can prevent fingerprinting. The hash is generated on a combination of heuristics but usually based on canvas fingerprinting. Network fingerprinting is not reliable.
Fi launched with Sprint and T-Mobile roaming and added US Cellular, but is presently T-Mobile only. I don't think AT&T has ever been a supporter carrier.
I don't think I agree with the following from this guide:
> Do not use a personal virtual private network (VPN). Personal VPNs simply shift residual risks from your
internet service provider (ISP) to the VPN provider, often increasing the attack surface. Many free and
commercial VPN providers have questionable security and privacy policies. However, if your
organization requires a VPN client to access its data, that is a different use case.
> Personal VPNs simply shift residual risks from your internet service provider (ISP) to the VPN provider, often increasing the attack surface.
That's true. A VPN service replaces the ISP as the Internet gateway with the VPN's systems. By adding a component, you increase the attack surface.
> Many free and commercial VPN providers have questionable security and privacy policies.
Certainly true.
> if your organization requires a VPN client to access its data, that is a different use case.
Also true: That's not a VPN service; you are (probably) connecting to your organization's systems.
There may be better VPN services - Mullvad has a good reputation around here - but we really don't know. Successful VPN services would be a magnet for state-level and other attackers, which is what the document may be concerned with.
https://archive.org/details/BlackICE_Defender
reply