this post was submitted on 14 Mar 2025
19 points (85.2% liked)
Privacy
35462 readers
251 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I wouldn’t use Copilot for this, as it may be using some older info on you that it already has. There are lots of “whatismyip” type sites that can try to guess your location. Failing that, see what region Google serves you ads from—any YouTube ads I get are always from my VPN endpoint country/region.
Also, just try plain old Tor Browser to compare with your setup.
Maybe, but it's a brand new Linux install. New browser and everything, just a bit unnerving you know?
Usually it uses your IP address first, bit it's not the only information in cases where the IP address is a known VPN or similar. Are you saying you were tunneling over TOR the first time?
When you switched to VPN you didn't mention what browser. If it's one that supports advertising IDs, that could be used, for example.
And when you connected to copilot did you get a captcha popup? If so, did you have to actually solve a captcha or click a button? If not, then it likely is getting information from somewhere that you are trustworthy.
Clear all browser data, make sure enhanced tracking protection is not disabled for the site. Go to a site that tells your IP address and verify it's the Tor endpoint to verify the setup there is correct. Then try again.
Also, assuming you're not clicking through any popups to allow tracking info or logging in to any accounts on this browser beforehand. If you log into a Microsoft account or any other account for a site that Microsoft gets info from first, it can use those logins to track you. You can disable this in the browser, but so many sites will break without it.
It might have been your DNS that was identified? It depends on whether you enabled proxy DNS for SOCKS5.
For best fingerprinting protection, use either:
Avoid using Tor with a normal browser because you will stick out like a sore thumb.