Ah! Sorry, I forgot about that. I haven’t tested it with a browser that actually returns a trust score in a while. It doesn’t even bother to load that section of the page if too much data is obfuscated. So with TOR, Brave, and Librewolf I’m not seeing anything at all.
There’s a lot of people that have done write-ups on how to use the data.
You know what - it looks like the dev removed that entirely.
The trust score and a counter used to be in the top-left, first box under the hashes at the top. it would start a timer for 30 days and tell you how many visits you had during that time.
It was handy because you could change your VPN location and still ping as a second visit if using the same browser. Change a few more things and location again, and it would still ping as a visit. If you used Tor, it would show like 80 visits in the last 30 days.
It looks like they removed it last month some time. I hadn’t used it in a while and totally blanked about that being a thing. It doesn’t render if you just block JS entirely, so I just sort of forgot about it.
Weird. I’m glad you mentioned that. I’m curious where the old code is, might as well try and fork it for myself on another git.
I forked the Github repo and reverted to an older version and it looks like when he removed the API access 3 weeks ago, the trust score thing went away. The whole section of code is gone, and if you just revert to an older version it doesn’t work anymore.
To be fair, a lot of what he was working on was ways to scrape sites and not get dinged by Cloudflare, and over the last 3 years, things have changed quite a bit. We’ll just have to wait and see what happens I guess.
TB (the better browser for general browsing), MB (sometimes), LibreWolf (for more personal use), Brave (for tab sharing functionality specifically, on desktop; I want to use Cromite instead but had issues). On Android just Ironfox + TB
For logins and payments - Brave and FF + Arkenfox FPP.
Main Driver - Mullvad, FF + Arkenfox RFP (to watch videos) and Librewolf (fallback)
Fun fact - Installed Zen Browser set as default and blocked internet access while links are accidentally clicked in other apps.
Medium number of profiles to test various with fingerprinting sites and experimenting.
Android: Brave and Ironfox. Sometimes Cromite.
All browser data cleared on exit. Bookmarks management is tough so after sorting all bookmarks created a main folder which has sub folders with browser and OS name.
Search engine: Only DDG. Brave as fallback. Startpage DDG after hearing that the former uses more trackers. The post request in DDG is mediocre whereas startpage and searxng are robust and brave doesn’t have such feature. Idk last time when I used Google. I always perform searches after visiting search site.
desktop: librewolf (with some tweaks* to make daily driving comfier) for recreation; firefox (hardened) for work. automatic containers for “aggressive” services (eg: youtube).
phone: ironfox for everything (i don’t browse much on phone). browser diversity is more important than using some flavour of chromium.
vpn: always on. i hole-punch a few services on my desktop via iptables rules, and a few banking apps on my phone. dns is currently a bit of a mess; normally i use a local pihole instance, but currently using whatever dns the vpn provides. probably better off this way, but whatever. would prefer to use pihole if i can
search: startpage always. /shrug if this is the best option, but i like it
*librewolf tweaks:
extra addons: firefox multi-account containers (to manage automatic site → container); history cleaner (purge history >14 days on startup); noscript (currently creating a ruleset im tentatively calling the “minimum viable bullshit”, the most restrictive permissions i can get away with)
enabling dark mode: this is perhaps a controversial one, but for me i need dark mode. dark reader sucks balls. i do this by setting up a user.js for librewolf with:
addendum: mullvad browser seems interesting, but the fact that it’s named after & maintained by mullvad makes me not use it (mullvad has a good track record, but purely just because it minimises any impact if mullvad goes rogue, as unlikely as that my be). my goal is to exceed the requirements by my threat model while being as comfortable as i am otherwise.
i would love progressive onion-ing on librewolf, ie i could connect to *.onion and it’d automagically route through tor, and anything else stay put. i might play around with implementing this myself.
Just Firefox with the Arkenfox user.js, uBlock, and uMatrix. DDG for search. I don’t really see the point of profiles since the browser starts afresh after being closed and does not keep any history or cookies.
Brave on macOS and use Mullvad Leta for everyday browsing. Tor browser when a website blocks me because I’m in the US and it requires ID verification of my age. And Firefox with Phoenix modifications to use Meta services, mostly Facebook, because most of my family uses it to communicate, and the Facebook container features are a nice touch. Running Mullvad at the network level with killswitch turned on my UDM-Pro.