frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
494•klaussilveira•8h ago•135 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
835•xnx•13h ago•500 comments

How we made geo joins 400× faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
52•matheusalmeida•1d ago•9 comments

A century of hair samples proves leaded gas ban worked

https://arstechnica.com/science/2026/02/a-century-of-hair-samples-proves-leaded-gas-ban-worked/
108•jnord•4d ago•17 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
161•dmpetrov•8h ago•75 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
165•isitcontent•8h ago•18 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
59•quibono•4d ago•10 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
274•vecti•10h ago•127 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
221•eljojo•11h ago•138 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
337•aktau•14h ago•163 comments

Show HN: ARM64 Android Dev Kit

https://github.com/denuoweb/ARM64-ADK
11•denuoweb•1d ago•0 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
332•ostacke•14h ago•89 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
34•kmm•4d ago•2 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
420•todsacerdoti•16h ago•221 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
355•lstoll•14h ago•246 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
15•gmays•3h ago•2 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
9•romes•4d ago•1 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
56•phreda4•7h ago•9 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
209•i5heu•11h ago•152 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
121•vmatsiiako•13h ago•47 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
32•gfortaine•5h ago•6 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
156•limoce•3d ago•79 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
257•surprisetalk•3d ago•33 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1011•cdrnsf•17h ago•421 comments

FORTH? Really!?

https://rescrv.net/w/2026/02/06/associative
51•rescrv•16h ago•17 comments

I'm going to cure my girlfriend's brain tumor

https://andrewjrod.substack.com/p/im-going-to-cure-my-girlfriends-brain
89•ray__•4h ago•41 comments

Evaluating and mitigating the growing risk of LLM-discovered 0-days

https://red.anthropic.com/2026/zero-days/
43•lebovic•1d ago•12 comments

How virtual textures work

https://www.shlom.dev/articles/how-virtual-textures-really-work/
34•betamark•15h ago•29 comments

Show HN: Smooth CLI – Token-efficient browser for AI agents

https://docs.smooth.sh/cli/overview
78•antves•1d ago•59 comments

Show HN: Slack CLI for Agents

https://github.com/stablyai/agent-slack
43•nwparker•1d ago•11 comments
Open in hackernews

Browser Fingerprint Detector

https://fingerprint.goldenowl.ai/
98•eustoria•5mo ago

Comments

AmazingTurtle•5mo ago
Brave Browser is not detected, lol
ranger_danger•5mo ago
Still nowhere near as good as creepjs: https://abrahamjuliot.github.io/creepjs/

Doesn't even detect common browser extensions.

croemer•5mo ago
Wow, this blows it completely out of the water. Even detects battery level, free storage, fonts etc
Bilal_io•5mo ago
It depends on the browser you're using, Brave is obfuscating a lot of this info, for me using Brave on Android it shows 100% battery while my actual battery is 62%.
malfist•5mo ago
On Firefox on android almost everything except the basics you expect are "unsupported"

It has file system free space, but it's wrong.

jszymborski•5mo ago
Sure, but is the fingerprint at the top stable? It is for me despite most of the tests being blocked, spoofed, or randomized.
jszymborski•5mo ago
One thing I find odd is that, on LibreWolf, a lot of these fingerprint tests are disabled or even worse, randomized. How is it able to generate a stable fingerprint?
kitsun3•5mo ago
Is there any library I could use for HW finger printing? I'd like to detect and ban evasions.
majorchord•5mo ago
https://github.com/fingerprintjs/fingerprintjs

https://github.com/abrahamjuliot/creepjs

https://github.com/thumbmarkjs/thumbmarkjs

maelito•5mo ago
This is why privacy must be enforced by states, their laws and a powerful public enforcement agency.

You cannot expect people to technically protect themselves from tracking.

(you can invite them to not use abusing services though)

dylan604•5mo ago
> (you can invite them to not use abusing services though)

First, you'd have to define how one can determine what an abusive service is. Is Facebook an abusive service? Is some random website that happens to use FB's SDK an abusive service? How does a normie internet user find out the site they are using has abusive code? Some plugin/extension that has a moderated list that prevents a page from loading and instead loads a page dedicated to explain how that specific site is abusive?

chipsrafferty•5mo ago
> Is Facebook an abusive service?

Yes

> Is some random website that happens to use FB's SDK an abusive service?

Yes

ranger_danger•5mo ago
Now write it down and get a majority of the population to agree with you.
NoboruWataya•5mo ago
Perhaps I'm missing it but does it explain what aspects of your setup contribute the most to your score or suggest remedial actions? I wasn't that surprised to find that my standard setup is highly fingerprintable (for one, I use Firefox which alone is enough to single me out in a crowd) but I also tried using a vanilla Chromium install via a popular commercial VPN and still got a rating of 100%.
seanw444•5mo ago
I'm curious as well. Ran a stock Vanadium config with Mullvad enabled, and got 100%. Maybe Vanadium isn't as focused on fingerprinting as I'd thought.
zargon•5mo ago
Running Chrome will make you highly fingerprint-able since it has so many APIs that can identify your hardware and software configurations directly or indirectly. It doesn’t help you “blend in” at all.
abhaynayar•5mo ago
Looking at the JS, in the `calculateUniqueScore` function - it is just checking how many features it was able to detect (it gives a weight to each summing up to 100).

It is not checking how unique you are based off of some data-set it has.

This site also has plenty other such "issues"/"bugs" feels like it was quickly vibe-coded without much care.

dktalks•5mo ago
Why does this have a domain of .ai, what exactly it is doing AI related?
kergonath•5mo ago
.ai is a ccTLD. Being AI related is not a factor to get one.
latexr•5mo ago
But they are considerably more expensive than more common TLDs, so if you’re getting one you presumably want it specifically and understand the association users will make.
dylan604•5mo ago
Or it could be that the .com domain was already registered and unavailable, so they started browsing the other TLDs to see where they could find something and felt like .ai is new/hip/trendy
latexr•5mo ago
Which we know is not the case here, if you just visit the domain (instead of the submitted subdomain).

https://goldenowl.ai

This is very much an AI-centric website.

kergonath•5mo ago
Maybe, but there are still many reasons to get one and it does not make anybody less legitimate than AI startups (which was the parent’s point).

Besides, they do sell AI-related services.

latexr•5mo ago
> and it does not make anybody less legitimate than AI startups (which was the parent’s point)

Was it? I’m interested in what exactly in their post makes you say that. I see confusion, not any accusation regarding legitimacy.

> Besides, they do sell AI-related services.

I know, I checked the main domain. My point was simply that if you spend extra money on a domain which has a strong association with something, it would be expected that whatever you put on it is associated with it (which indeed is the case). Otherwise you’d be wasting money and confusing potential users, which isn’t generally good business practice.

basilikum•5mo ago
> Fingerprint Collection Failed

> This can happen due to several reasons:

> [...] JavaScript Errors: When any of the 24+ fingerprint collection methods throws an error [...]

So when any of the browser APIs it exploits aren't available, it just fails instead of using that as a datapoint in itself. I'm unimpressed.

AbraKdabra•5mo ago
So, what's the solution to all of this? Are there any settings I need to modify to Chrome to not allow certain info to be queried?
elenchev•5mo ago
yes but then you become a "suspicious user" and you have to fill 100 CPATCHAs every day

at this point browser fingerprinting is a feature, not a bug

jay-barronville•5mo ago
To be frank, in my book, relative to inadvertently being fingerprinted and tracked wherever I go, I consider being consistently faced with “let’s confirm you’re not a robot” popups and pages to be a minor inconvenience.
foresto•5mo ago
Consider that all those CAPTCHAs are fingerprinting your browser anyway, and probably also your biometrics (through your inputs while solving each CAPTCHA).
malshe•5mo ago
I second this. I tried to use Tor browser for a day in place of my regular browser. Many websites wouldn't open and the ones that dud asked me to fill in thousand captchas.
chipsrafferty•5mo ago
Even the unmodified Firefox browser with a few of the privacy settings turned on break a lot of sites.
jay-barronville•5mo ago
Use a different browser altogether. Chrome is never ideal for anyone who cares even a little bit about privacy. Use [Brave][0].

[0]: https://brave.com

avastel•5mo ago
I recently wrote about the limits of these kinds of fingerprinting tests. They tend to overly focus on uniqueness without taking into account stability. Moreover sample size is often really small which tends to artificially make a lot of users unique

https://blog.castle.io/what-browser-fingerprinting-tests-lik...

everdrive•5mo ago
This is great, and exactly the kind of nuance I almost never see when this topics come up. Thanks for posting this. Far too often, the pro-privacy crowd is much more _upset_ than they are precise, and to the point of your article are spending extra effort without really accomplishing much.
everdrive•5mo ago
I'm deeply confused by a lot of the privacy discourse here. There seems to be opposing goals between preventing the fingerprinting mechanisms and just preventing uniqueness. Under the "preventing uniqueness" model, my Linux computer with custom Firefox and no fonts, and no js, etc. is the "most fingerprint-able" because it's the most unique. Whereas grandma on Windows and Chrome is "less unique," and therefore in some sense less fingerprint-able.

I think there are a few potential problems with this view that I never see discussed:

- Firefox sends some dummy data when making use of privacy.resistFingerprinting, and so you should get a unique fingerprint _every time_ you visit a site, so the fact alone that you're unique might potentially not matter if you're _differently_ unique every time you visit the site. Is there a flaw in this line of thinking?

- My understanding is that the primary utility of browser fingerprinting is for advertising / tracking. In other words, the bulk of the population an advertiser would actually care about would be the huge middle of the bell curve on Chrome using Windows, not the privacy nuts on Linux with a custom browser config. In other words, if "blending in with the crowd" really worked I would think that tracking companies would fail against the most important and largest part of the user pool. If anything, it's more important to target grandma as she will actually click on ads and buy stuff online compulsively.

Can anyone speak to these points? I often feel like the pro-privacy people are just crawling in the dark and not really aware of that real-world tracking is actually occurring vs. what might be possible in a research paper. Maybe I'm just the one that's confused?

rsync•5mo ago
"... so the fact alone that you're unique might potentially not matter if you're _differently_ unique every time you visit the site. Is there a flaw in this line of thinking?"

No, you're thinking correctly and the odd discourse that you (and I) see is based on two implicit assumptions:

1) Your threat model is a global observer that notices - and tracks and exploits - your supposed perfect per-request uniqueness.

2) Our browsers do not give us fine grained control over every observable value so if only one variable is randomized per request, that can be discarded and you are still identifiable by (insert collection of resolution and fan speed or mouse jiggle or whatever).

Item (1) I don't care about. I'd prefer per-hit uniqueness to what I have now.

Item (2) is a valid concern and speaks to the blunt and user-hostile tools available to us (browsers, that is) which barely rise to the level of any definition of "user agent" we might imagine.

I repeat: I would much prefer fully randomized per-request variables and I don't care how unique they are relative to other traffic. I care about how unique they are relative to my other requests. Unfortunately, I am wary of browser plug-ins and have no good way to build a trust model with the 12 different plug-ins this behavior would require. This is the fault of firefox and the bad decisions they continue to make.

franga2000•5mo ago
> Unfortunately, I am wary of browser plug-ins and have no good way to build a trust model with the 12 different plug-ins this behavior would require. This is the fault of firefox and the bad decisions they continue to make.

I see so many people paranoid about browser extensions and I really don't see the point. It's like any other software. If you trust the author, install it. If you don't trust the author, check the source code, install it (ideally from source), disable automatic updates and subscribe to the changelog. Is this any different from any other thing you install on your device?

gruez•5mo ago
>- Firefox sends some dummy data when making use of privacy.resistFingerprinting, and so you should get a unique fingerprint _every time_ you visit a site, so the fact alone that you're unique might potentially not matter if you're _differently_ unique every time you visit the site. Is there a flaw in this line of thinking?

Yes, because those randomized results can be detected, and that can be incorporated into your fingerprint. Think of a site that asks you about your birthday. If you put in obviously false answers like "February 31, 1901", a smart implementation could just round those answers off to "lies about birthday" rather than taking them at face value.

>- My understanding is that the primary utility of browser fingerprinting is for advertising / tracking. In other words, the bulk of the population an advertiser would actually care about would be the huge middle of the bell curve on Chrome using Windows, not the privacy nuts on Linux with a custom browser config. In other words, if "blending in with the crowd" really worked I would think that tracking companies would fail against the most important and largest part of the user pool. If anything, it's more important to target grandma as she will actually click on ads and buy stuff online compulsively.

The problem is all this fingerprinting/profiling machinery ends up building a profile on privacy conscious people, even if they're impossible to sell to. That can later be exploited if the data gets leaked, or the government demands it. "I'm not a normie so nobody would want to show ads to me" doesn't address this.

throwawayqqq11•5mo ago
Advertisers try to reidentify and match you against their database, the less information you give them and the more randomized it is, the less certain they can be, its you again.

If i use my locked down firefox with a VPN where potentially a hand full other brills like me come out on the other end, i am not concerned about them building a profile of me.

gruez•5mo ago
>Advertisers try to reidentify and match you against their database, the less information you give them and the more randomized it is, the less certain they can be, its you again.

This assumes the randomization is done properly, otherwise it just turns into a signal of "installs privacy extensions", which can still be used for targeting, as a sibling commenter has mentioned.

bigbadfeline•5mo ago
> otherwise it just turns into a signal of "installs privacy extensions"

The more such signals, the merrier, the parent of your comment addressed that ("other brills"). Instead of going in circles, it would be better to encourage people to evaluate and use such extensions. Telling them that they don't work is a self-defeating half-truth.

socalgal2•5mo ago
You are correct, the discussion is often unthoughtful and spun.

> the bulk of the population an advertiser would actually care about would be the huge middle of the bell curve on Chrome using Windows

The middle of the bell curve in the USA would be an iPhone and there is very little you can customize. So many people have the same model with the same settings that trying to track by fingerprinting is effectively useless.

Yes, PC/Linux users have more to track. They are the minority though. I'm not saying therefore ignore this issue. But grandma is using her phone. Not a PC.

> Firefox sends some dummy data when making use of privacy.resistFingerprinting, and so you should get a unique fingerprint _every time_ you visit a site

This assumes the fingerprinter can't filter out that random data, and that the feature is actually useful. Some of things it does sound like sites might fail or cause problems. Setting timezone to something else seems like I'm going to make a reservation for 7pm only to find out it was 7pm in another timezone. other things it doesn't might not be good for grandma. CSS will report preferred reduced motion as False. CSS will report preferred contrast as No Preference.

everdrive•5mo ago
I definitely agree with you point, but I think that's what I'm wondering about? Can it actually be filtered out, and are tracking companies actually do this in practice, or is it like when someone says they bridge an airgap by making two computer's RF spectrum do funny things? Possible in a lab, yes. Something most people need to worry about? No.

I'm not saying this _isn't_ the case for tracking -- I just don't have much of a way to know what techniques are actually being employed in real life.

ranger_danger•5mo ago
The comment by gruez is accurate IMO.

Creepjs actually tries to detect what your browser is lying about and takes that into consideration (or not) based on its heuristics.

I'm still not aware of any FOSS browser (with JS actually enabled and functioning) that can produce a random fingerprint ID on every refresh of the creepjs test site.

But please prove me wrong.

everdrive•5mo ago
I've never heard of creepjs, are there more resources about it and where it's used?
aerostable_slug•5mo ago
I used to work in adtech a long while back. We found that our system could effectively target people who tried not to be targeted. By that I mean we realized a better ROI that without said targeting and click-throughs & conversions were happening for our customers at a nice rate.

At the end of the day the object of the exercise is generally less about building a perfect profile of a person and a lot more about getting said person to buy something. We found our system worked very well at figuring out what ads worked on privacy-conscious people and our customers saw a nice ROI from it.

In fact, it turns out pro-privacy technically skilled people cluster nicely and it's entirely possible to sell them stuff, and their attempts to be less 'profileable' than normal actually helped our mission (which was advertising, an endeavor that in my experience doesn't GAF about violating a given person's privacy in the way the pro-privacy crowd often thinks it does).

Take from that what you will.

everdrive•5mo ago
Can you describe in more detail what sort of techniques were used to target and track people? What sort of privacy mitigations were feckless?
aerostable_slug•5mo ago
It wasn't so much that privacy mitigations were feckless, it was the fact that people who did things like falsify their User-Agent strings tended to cluster into distinct groups very nicely, and hence it was easy for the targeting algorithms to feed them effective ads, landing pages, etc.

The targeting system went "oh goody, privacy geeks" and was able to very effectively do its job. This is because ad tech systems care less about you as everdrive the named individual with privacy interests and other human aspects, and more about you as some potential consumer of goods.

While it's possible to use the systems to profile people in the sense that a stalker might, that's not really the intent (in the way people like to think of it). I (in the past tense, I don't do adtech anymore) honestly don't care about you, I just want you to buy shit from the people who pay me to sell you their particular flavor of shit. If you hiding your exact name or browser details or whatever makes that more likely (it turns out it did), then hooray! There's no conflict there, where to some there would be (because their assumptions about motive are all wrong).

In terms of what techniques, we found machine learning (stats) way back then did a pretty good job of clustering people based on things browsers return (monitor resolution, OS, etc.) coupled with time of day, search terms, and other things you can't really suppress. A completely contrived example might be pushing expensive pediatric electrolytes to someone with a large-screened Mac looking up baby flu symptoms at 2 am. The "system" did a far better job of real time targeting with this stuff than any human could, and the things it would cluster on were often rather unintuitive.

everdrive•5mo ago
Thanks, this is a really useful reply. With regard to identifying privacy-focused users in your system, I'm sort of imagining the following scenario:

- user has a bunch of privacy mitigations and tweaks in their browser

- user logs into your commerce site, searches for stuff to buy

- commerce site knows who the user is since they're logged in, and per your comment can infer whether or not they're wealthy, have kids, etc. based on the user activity and whether or not the user is likely have an expensive screen & GPU, etc.

Does that sound right? That's really interesting, and something I'm embarrassed to say I hadn't really thought of. In other words, I've spent a lot of time worrying about cross-site tracking, and advertising domains, etc. However, if I'm purchasing from Amazon they know it's me since I'm just shipping to my own house. Even in a scenario where my browser is magically un-fingerprint-able, it's obviously me since I'm using my account and shipping to my house.

In other words, I may potentially have prevented a bunch of cross-site tracking and fingerprinting. Perhaps when I go to washingtonpost.com they don't know I'm the same person that Amazon knows about. (that might be a best case scenario) However, by virtue of the fact that my privacy config is operating all the time, Amazon has also learned something about me I didn't necessarily need to tell them -- ie, that I'm privacy-focused.

Do you think that's a fair assessment, or am I missing the point?

aerostable_slug•5mo ago
> Amazon has also learned something about me I didn't necessarily need to tell them -- ie, that I'm privacy-focused.

Exactly, and it turns out privacy-focused people tend to be relatively self-similar in many ways and, at least back in the day, were easier to advertise to.

Now, Amazon (or whomever) still doesn't know your name, but they are still targeting you and, what I found super interesting, is the fact that it was often more effective targeting than if the person was just part of the bulk of the population. It's kinda like if the system observed all the nonconformist teens like to wear Doc Marten's.

runlaszlorun•5mo ago
Informative, thanks for sharing.
godelski•5mo ago

  > Whereas grandma on Windows and Chrome is "less unique," and therefore in some sense less fingerprint-able.
I got highly unique on FF so I tested Safari on a M2 Air. Still says I'm highly unique. I'm on a university campus internet, there's thousands of people with that exact same setup. I don't think I've ever seen a finger printing site that doesn't say I'm very unique.

I think the problem I have with these types of sites is that they do not really offer advice on how to become less unique and how to protect one's self. It's probably pretty easy to identify machines through things like canvas fingerprinting or through all the other things that the browser actually exposes. Many privacy browsers like Tor or Mullvad will just send no data to those. That makes them "unique" because there's not many people using browsers that do that but it's unique in a way that makes you fungible. There's unique as in "uncommon" but also unique as "differentiable." I can't understand how these sites never make that distinction.

joahnn_s•5mo ago
This is the paradox: Imagine walking dressed in red in the middle of a crowd dressed in black.

Being unique makes one easily identifiable and requires less effort to correlate one's past activity, while non-unique ones are full of noises and low confidence.

dmitrygr•5mo ago
The original is panopticlick from EFF: https://coveryourtracks.eff.org/

I do not see how this is better

willhschmid•5mo ago
Fingerprint Collection Failed

Yay, I am safe. I use Brave. Everyone should use Brave.

SubiculumCode•5mo ago
Ah... I was here wondering why browsers don't just run sites in a built-in virtual containers..allowing the same reports of the same hardware for everyone. especially for WebGL and canvas fingerprinting.

I suppose someone might say it is about performance of going through a virtual layer? I understandit might break specialized 3D web-apps...but for common web-browsing? idk. Do people regularly use web-based app that need direct access to a GPU to be fast and functional? But surely, an exceptions list could work.

I am sure I am missing something, but what?

socalgal2•5mo ago
people regularly use Google Maps and video conferencing apps (Zoom, Meet, FB Messenger, ...) all of which use the GPU. Maps to be able to customize the map based on what your point of interest is. VC apps to do background blur, addons, etc...
SubiculumCode•5mo ago
BUt can the gpu not be virtualized?
Yeul•5mo ago
My browser is in a constant battle with Cloudflare but HN loves them...
just_human•5mo ago
Interesting, even with a VPN on mobile safari on an iPhone over a carrier connection I get a uniqueness score of 100%. This is a neat tool, but I'm skeptical of its accuracy. I've run similar tests of uniqueness in the past and this just isn't accurate.
vachina•5mo ago
Yes, they claim 100% but the hash changes.
jjangkke•5mo ago
kinda wish I didn't visit this website as I don't know what goldenowl privacy policy is
Beijinger•5mo ago
On my privacy hardened Firefox, this website does not work. NoScript deactivated, Adblock deactivated, still does not work.
thekoma•5mo ago
I figured it out! I disabled scripts so the code of the website never ran. Now am not highly unique! (Neither am I “not highly unique” though.)
hilbert42•5mo ago
Well, perhaps my system is better than I thought. The site could not resolve anything until I turned JavaScript on (JS off is my normal default state)—it continued to poll and displayed nothing indefinitely (had to be terminated).

When I turned JS on it could not determine my machine type, got screen reso wrong and it provided incorrect location info (map and coordinates were wrong). Moreover the browser type was incorrect (but then I automatically randomize the browser type on each launch).

keninorlando•5mo ago
I never realized my battery charge state could be read.. The json data file is pretty impressive.

  },
  "battery": {
    "charging": true,
    "chargingTime": 0,
    "dischargingTime": null,
    "level": 1
  },