frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
567•klaussilveira•10h ago•159 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
885•xnx•16h ago•537 comments

How we made geo joins 400× faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
89•matheusalmeida•1d ago•20 comments

What Is Ruliology?

https://writings.stephenwolfram.com/2026/01/what-is-ruliology/
16•helloplanets•4d ago•8 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
16•videotopia•3d ago•0 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
195•isitcontent•10h ago•24 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
197•dmpetrov•11h ago•88 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
305•vecti•13h ago•136 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
352•aktau•17h ago•172 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
348•ostacke•16h ago•90 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
20•romes•4d ago•2 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
450•todsacerdoti•18h ago•228 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
77•quibono•4d ago•16 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
50•kmm•4d ago•3 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
247•eljojo•13h ago•150 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
384•lstoll•17h ago•260 comments

Zlob.h 100% POSIX and glibc compatible globbing lib that is faste and better

https://github.com/dmtrKovalenko/zlob
9•neogoose•3h ago•6 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
227•i5heu•13h ago•172 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
66•phreda4•10h ago•11 comments

Why I Joined OpenAI

https://www.brendangregg.com/blog/2026-02-07/why-i-joined-openai.html
111•SerCe•6h ago•90 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
134•vmatsiiako•15h ago•59 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
23•gmays•5h ago•4 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
42•gfortaine•8h ago•12 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
263•surprisetalk•3d ago•35 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
165•limoce•3d ago•87 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1037•cdrnsf•20h ago•429 comments

Show HN: ARM64 Android Dev Kit

https://github.com/denuoweb/ARM64-ADK
14•denuoweb•1d ago•2 comments

FORTH? Really!?

https://rescrv.net/w/2026/02/06/associative
58•rescrv•18h ago•22 comments

Show HN: Smooth CLI – Token-efficient browser for AI agents

https://docs.smooth.sh/cli/overview
86•antves•1d ago•63 comments

WebView performance significantly slower than PWA

https://issues.chromium.org/issues/40817676
22•denysonique•7h ago•4 comments
Open in hackernews

Show HN: Explore what the browser exposes about you

https://neberej.github.io/exposedbydefault/
275•coffeecoders•2mo ago
I built a tool that reveals the data your browser exposes automatically every time you visit a website.

GitHub: https://github.com/neberej/exposedbydefault

Demo: https://neberej.github.io/exposedbydefault/

Note: No data is sent anywhere. Everything runs in your browser.

Comments

coffeecoders•2mo ago
Hi HN,

I’ve been experimenting with ways to reduce my browser fingerprint and exploring techniques to anonymize fingerprint data.

So I built this.

This is kind of like a lighter, more thorough version of CreepJS but entirely client side. I don’t maintain massive lists of time zones or do server-side comparisons to calculate uniqueness. Instead, it automatically surfaces everything a browser exposes, explaining each item in detail.

locknitpicker•2mo ago
Hi, thank you for going through the trouble of putting this together. This sort of service is invaluable as it allows us clueless people to be mindful about something that negatively impacts our life.

Here's a suggestion: it's important to show us that our browser footprint allows us to be positively identified and tracked, but it only alerts us to a problem. It would be very useful if the site also provided some tips to improve anonymity, particularly if it's low-effort changes such as tweaking a couple of config changes.

greggman65•2mo ago
There's a mis-understanding of at least the Graphics part. For example WebGPU features. It looks like lots of info

https://webgpureport.org/

But, they are bucketed

https://www.w3.org/TR/webgpu/#privacy-considerations

It's not zero pieces of info but it's also not close to as bad as it looks. Effectively, everyone who has, say an NVidia GPU, will likely have the same list of features and limits.

As a more general example: The number is just a flat out wrong

> Unique to 1 in 2,147,483,648+ devices.

No, I have an iPhone Pro and am in the PST time zone, set to English. It has the exact same finger print as millions of other devices among the 40 million people in the PST time zone. In general, The only things different between 2 iPhones of the same model are time-zone, laguange setting, and font size.

Please STOP EXAGGERATING!

jedberg•2mo ago
> No, I have an iPhone Pro and am in the PST time zone, set to English. It has the exact same finger print as millions of other devices among the 40 million people in the PST time zone.

Your IP address, ASN, and location make this not true.

greggman65•2mo ago
Those have nothing to do with "what the browser exposes". They are exposed regardless of what you use to connect.
jedberg•2mo ago
But the browser knows them too and the site can get you to reveal it, even behind a vpn.
dror•2mo ago
Beyond the obvious IP address difference, there are other way to fingerprint you, see https://coveryourtracks.eff.org/ which will actually provide details about how you're a special snowflake, tracked by advertisers.
greggman65•2mo ago
that site is just as bad at giving probably false numbers that are several orders of magnitude off
garbagewoman•2mo ago
You’re quite welcome to not believe what everyone is telling you.
ErroneousBosh•2mo ago
> This is kind of like a lighter, more thorough version of CreepJS

you walked right by the chance to call it WeirdoJS

godelski•2mo ago
I'm really frustrated with these types of websites because they tell me nothing.

What I'd love for these sites to do is help me understand where I am distributionally. How unique am I? On what? Help me understand what needs to be fixed and what my threat vector is.

The problem with these is that I'm always unique. Doesn't matter what browser I'm on or what. If I am unique on a clean Apple laptop in either Safari or Chrome then it is essentially meaningless. I got controlled hardware and vanilla software, how else do you blend into the crowd?

But in the wild sites aren't always implementing all these features. So I want to see if I'm unique to standard site or even one that is a bit more heavy. Importantly HOW unique am I? What things am I not unique, how unique am I, and what are the most unique things about me?

Having that information gives me the ability to do something about it. Without that information then this is just like any other website where essentially the message is "be scared! People can track you on the internet and there's nothing you can do about it!"

Phelinofist•2mo ago
> What I'd love for these sites to do is help me understand where I am distributionally. How unique am I? On what? Help me understand what needs to be fixed and what my threat vector is.

This EFF tool does this https://coveryourtracks.eff.org/

godelski•2mo ago
Thanks, I forgot about that one.

To critique that (and maybe suggest what OP can do to make theirs better) is that there's poor visualization. What's great is that it tells me there right in center

  > Our tests indicate *that you have **strong protection against Web tracking***.

  > Blocking tracking ads?             Yes
    Blocking invisible trackers?     Yes
    Protecting you from fingerprinting?    Your browser has a nearly-unique fingerprint
But give me some visualization. Sentences like

  Bits of identifying information: 6.76
  One in x browsers have this value: 108.61
Are not super helpful, though they should exist. Showing a density plot[0] is very useful[1]. It gives the user more information, telling them where they need to go. Even a simple replacement to

  One in *108.61* browsers have this value
Makes things easier to read.

In an ideal setting I think the site should suggest to users what they should change and show them where they could be with the new settings. Letting them play around and adjust a some settings.

I know I'm being nitpicky here and to be honest I think the EFF version is "good enough" but I still think adding such visualizations and letting users "see" the results makes things easier to understand and can help them know what to do.

[0] https://seaborn.pydata.org/generated/seaborn.kdeplot.html

[1] In this case it isn't going to be continuous since I pulled from the User agent so this will have more discrete bins. Helping inform the user would be seeing the proportion of those other bins. That way they know what to change their user agent to!

lossyalgo•2mo ago
It would be nice if they (or someone) could list ways to mitigate against each of these information leakages. Or even nicer if someone made a plugin that make us unidentifiable. Even nicer would be a way to e.g. disable sharing which fonts, extensions, etc. I have installed. Why do webpages even need to know such details? What if our browsers just sent Firefox vN instead of this huge string? Why does a webpage need to know how many CPU cores I have, or, let's say I have > 4, that should be sufficient to run any webpage and anything > 4 could just be reported as 4. If they don't know these things, I assume webpages/frameworks will still work fine.
coffeecoders•2mo ago
You're 100% right. The raw fingerprint dumps alone are not actually useful unless you can compare them to a population.

And creating that comparison is far harder than people think. To answer "How unique am I?" I need a large, representative dataset of fingerprints collected over time and ideally weighted by how often real websites use each feature. That would require running an backend and database.

It’s something I’d like to build eventually, but only in a privacy-preserving, opt-in way that aligns with the spirit of the project.

godelski•2mo ago
I know I'm criticizing, but I do also want to make sure to say good job. I don't want to make it seem like I'm unhappy, if that makes sense.

For privacy prevention, maybe you can help me understand something better then. I was under the impression that for the most part, each fingerprinting technique itself was not enough to identify someone, but it is the collection of them. So in that setting, would not showing the distribution of the individual metrics likely preserve privacy? I can certainly see some subtle naive trap existing here that I'm not aware of but do you know of one? I at least would think things such as agent, dark mode, and some other things shouldn't risk deanonymization. Though clearly things like coordinates, unique fingerprints, and probably even the canvas fingerprinting shouldn't be shared. As long as each data point isn't associated with others and you have a decent sample size. But also I'd love to learn if I'm missing something important.

cocainemonster•2mo ago
amiunique.org shows percentages of values
evgpbfhnr•2mo ago
I get a new fingerprint id everytime I refresh the page (firefox, linux) -- so that might be sampling a tiny bit too much. audio and canvas fingerprint are constant though so it's probably plenty enough...
reconnecting•2mo ago
The same applies to macOS. Safari produces a unique fingerprint ID every time, and Firefox also has a different fingerprint ID with every visit.

If the fingerprint ID is unique every time, there is zero possibility of using it for identification.

conartist6•2mo ago
Very interesting. So this is the battlefield perhaps. Randomly corrupt the data instead of eliminating it?
mpeg•2mo ago
I think it might be because the performance fingerprints need to be bucketed. If they're too specific you'll never get the same fingerprint twice.
alentred•2mo ago
EFF has a similar tool: https://coveryourtracks.eff.org/

No idea how representative either tool is.

oersted•2mo ago
Interesting!

For me it says 1 in 17,179,869,184+, but scrolling through all the variables, the vast majority should be the same for any MacBook Chrome user.

It would be great to see the stats of each individual characteristic.

jspash•2mo ago
I would love to be able to toggle an attribute off/on to see what affect each has on the uniqueness of my fingerprint. My guess is that there are a handful of _very_ unique things, that if obscured, would make one less recognisable.
collinmanderson•2mo ago
https://coveryourtracks.eff.org/ is less detailed but shows the individual uniqueness of each attribute.
greggman65•2mo ago
that site has the same issue. It will give ridiculous and easily provably false results for iPhones.

There are ~40 million in the PST time-zone. Some percent have smartphones (80%+), ~50% of those are iPhones (16 million). Of those, the majority are set it English (80%+), and are divided into screen sizes. But basically, if you have an iPhone, you have the same fingerprint has at least a million other other people in the PST time size. You are at best, 1 of 100, not 1 of x,xxx,xxx,xxx.

You might be x,xxx,xxx,xxx of people who visited that unpopular site but no one needs tracking on an unpopular site. On a popular site you will not have a unique finger print.

njitram•2mo ago
I tried various browsers, even the Tor browser, but it keeps showing 'Unique to 1 in 17.179.869.184+ devices'?
qwertytyyuu•2mo ago
I have the exact same, Unique to 1 in 17,179,869,184+ devices. actually slightly different. hmmm... ,'s vs .'s
aaronharding•2mo ago
the person above you is from The Netherlands ;)
Sayrus•2mo ago
It's unique but changes on each reload. While the details are interesting, the fingerprint itself is not useful.
gruez•2mo ago
It's highly unlikely they obtained 17 billion samples, so they're likely guesstimating it by assuming each attribute is independent, and summing the entropy of all attributes. That's obviously incorrect, both because attributes are inevitably going to be correlated (eg. ip geolocation correlated with time zone), and that two identical devices (eg. 2 iPhones) will have identical fingerprints.
dunham•2mo ago
And I get a different id every time I reload.
reconnecting•2mo ago
May I ask if this code is the result of 'vibe coding'?
manbitesdog•2mo ago
It looks AI-assisted, based on these two commits: * https://github.com/neberej/exposedbydefault/commit/503bd6519... * https://github.com/neberej/exposedbydefault/commit/16693ba17...

But to what extent should we care for such a small website? The AI witch hunt won't get us too far, and this new way of producing is only getting started. The loss of control to a non-deterministic black box is worrysome, but at some point non-vibe coded (hard coded? brain coded?) software might become less error-prone that vibe-coded

mcny•2mo ago
> but at some point non-vibe coded (hard coded? brain coded?) software might become less error-prone that vibe-coded

Did you mean more instead of less?

manbitesdog•2mo ago
Yes (ᵕ—ᴗ—)
Santosh83•2mo ago
What we need is VPB. Virtual Private Browser like VPNs. Essentially standardised cloud browsers that can execute your requests and send you back the result as bitmap buffers.
ycuser2•2mo ago
Great idea! How to make sure that the users data stays private without the cloud knowing where the user is surfing. And I wonder how to monetise it? Subscription?
slig•2mo ago
I believe Cloudflare has this product already https://www.cloudflare.com/zero-trust/products/browser-isola...
ghxst•2mo ago
Not all websites work well, and you get a lot of captchas last time I tried it. From memory the way they make this work is pretty cool though, they capture Skia draw commands and send those over the network and use a wasm library to replay them.
sillyfluke•2mo ago
Didn't Stallman himself write and use something in the same vein to browse the internet?
selcuka•2mo ago
So basically VNC?
dvh•2mo ago
ERROR> https://neberej.github.io/exposedbydefault/assets/index-3936...: Uncaught ReferenceError: speechSynthesis is not defined
SeriousM•2mo ago
Here's another one: https://amiunique.org/fingerprint

It's important to point out fingerprinting, yet no ordinary user cares.

udev4096•2mo ago
> Doesn't even load with JS

> Impossible to "expose"

The perks of disabling JS on every site!

fareesh•2mo ago
seems like brave works well and isn't getting correctly fingerprinted
conartist6•2mo ago
I could not be more thrilled to see tools like this being built. Without tools to see the problems, we will never fix them
adhambadr•2mo ago
Yet on the flip side, if I’m trying to auto identify my own phone for a login-less private app i tried to build I couldn’t get to reliably generate a consistent fingerprint on safari private mode, it regenerates 50% of the time, I’ve tried several libraries like fingerprintjs and co..
zipping1549•2mo ago
How about mTLS?
ffsm8•2mo ago
Isn't that what webauthn was made for?

Or did I misunderstand you?

mr-wendel•2mo ago
Fwiw, I use Tailscale/wireguard and take care to ensure the source IP gets fed to apps properly. This makes it easy to guarantee I have a reliable way to identify myself on my webapps and auto-auth.
bstsb•2mo ago
this seems incredibly variable as to be almost useless as any type of "fingerprint" - running the latest version of Chrome on Android, the ID at the top of the page changes each reload.
peterspath•2mo ago
It’s just a blank page for me on iOS 26.1 Safari with Lockdown Enabled.
simianparrot•2mo ago
Seems like the fingerprint ID is unique on each refresh in Safari, so fingerprint protection working as intended I presume?
zamadatix•2mo ago
The main "Fingerprint ID" on this site seems to be a direct combination of all values, so if even a single one changes it'll act like the only conclusion is this is an entirely different fingerprint. Actual fingerprinting is a bit smarter, but it's not really possible to demonstrate that in a single clientside scripted static web page.

The more important bit to see from this tool is probably "this is an example of how much information which can aid in identification your browser exposes".

csomar•2mo ago
This is useless. I think you misunderstand the point of fingerprinting. A powerful fingerprinting algo should strive to detect you as the same person (aprox) while you use two different browsers. A more powerful one will detect you while you use another device. This only detect your current refresh.
quinncom•2mo ago
Thanks for pointing this out. At first, I was concerned – “Unique to 1 in 2,147,483,648+ devices” – but, my fingerprint ID changes with each page refresh, so there's no tracking possible. I'm using Brave on iOS.
zeeed•2mo ago
Is it possible and cost-covering to create an ad-sponsored service that discloses what ad networks collect about users - i.e. age, location, preferences, interests, pregnancy, illnesses etc?

Because let’s be honest - all of us know that a lot of data points are being collected about us, countless articles have been written about the insanity of cookie and user-data monetization networks - still it appears to be a privilege to few to tap into that data trove.

I personally haven’t seen an effort to try and make this transparent. Efforts like this page are commendable and informative, much like amiunique or other services - still they lack the tangible information that sharing this information with “the world” reveals about an affected individual.

Why hasn’t this been done yet? Why is this seemingly not trivial?

jedimastert•2mo ago
I'm unaware of how other platforms work, but for Google you can just see what buckets have been associated with your account:

https://myadcenter.google.com/controls

I'm not sure how that would work from an ad-buying perspective, from what I understand you essentially choose which buckets you'd like to show ads to? Like I don't think ad-buyers get the whole dossier for the person they're showing ads to, the platform just decides "from what you've told us, this person seems likely to like your ads"

svieira•2mo ago
You mean something like https://consumer.risk.lexisnexis.com/request?

Or more like "on ad network X you match for keywords A, B, F, G"?

boppo1•2mo ago
I want to know how much of my porn habits reddit/fb/google/whoever keep on file.
ProllyInfamous•2mo ago
Every load, and more.
sandbags•2mo ago
My understanding that attempts to defeat fingerprinting are often useless because they can tend to make you more, rather than less, unique.

So instead I wonder if we could build an open database of “identities” that our browsers could clone.

That is your browser deliberately reports the whatever is currently the most popular of a set of general identities.

efilife•2mo ago
This sounds good bit miss one thing and you are extremely unique again
QuantumNomad_•2mo ago
If two people have the same model iPhone and same version of iOS how different or similar would the fingerprints be?

My iPhone is allegedly unique to 1 in 2,147,483,648+ devices.

But I wonder how true that is, given how many people use the same model and iOS version as me.

ivanjermakov•2mo ago
There is a couple of hardware/software independent data points: time zone, currency, locale.

And if every option cuts the user base in half, becoming unque is a matter of 33 such options.

pwython•2mo ago
The fingerprint is comprised of more than device and OS:

Browser type and version

Screen resolution

Installed fonts

Browser plugins and extensions

Canvas fingerprinting data

WebGL (graphics hardware info)

Time zone

Language settings

IP address

HTTP headers

Touch support

Device type

AudioContext

QuantumNomad_•2mo ago
Yeah but several of those will also be the same if you have the same iPhone model and iOS. Safari browser updates are installed as part of iOS update. So anyone with the same iOS version has the same version of Safari.
stevetron•2mo ago
It reports that my OS is Windows 10 on two different browsers, even though my OS is Windows 7.
demetris•2mo ago
Do you know what user agent the browsers send?

I tried with Windows 7 (Firefox 115) and it reports Windows 7.

It seems though that it cannot distinguish between Windows 10 and Windows 11, so, without looking further, I suppose the detection is based on the User-Agent string? (The OS version browsers report on Windows is frozen, so Windows 10 and Windows 11 have the same version there.)

joahnn_s•2mo ago
Here's another one: https://scrapfly.io/web-scraping-tools/browser-fingerprint They actually delve much deeper, with a wealth of additional data and interesting details.

For example, in the DRM section, they extract the Security Level, like L3 – Software Decode (SW_SECURE_DECODE).

Their WebRTC test is also unique: they utilize a TURN server as a feedback mechanism. That means even if you tamper with WebRTC JS in the browser (like some extensions do), it can still expose your real IP by leveraging UDP and bypassing the proxy altogether. https://scrapfly.io/web-scraping-tools/webrtc-leak

Levitating•2mo ago
There's no hint of what the fingerprint ID is supposed to be?

Also I think somebody on HN recently pointed out that the language accept header can be used to fingerprint chromium users.

jedberg•2mo ago
If you reload the page a few times, and you're using a modern browser, you'll almost certainly find it's a different fingerprint every time. Most modern browsers add in a randomization so that fingerprinting cannot be used for tracking.

So yes, your fingerprint is unique, but it's a different unique every time, making it pretty useless for anything.

embedding-shape•2mo ago
Seems right, I'm on "Mozilla/5.0 (X11; Linux x86_64; rv:145.0) Gecko/20100101 Firefox/145.0" and reloading the page I get a new fingerprint each time. "Unique Fingerprint ID" seems to be the only attribute that changes each reload, but it isn't clear how that's derived.

Edit: Ah, turns out "Unique Fingerprint ID" is just the same fingerprint ID printed at the top, it isn't one of the attribute used for calculating the ID, it is the ID. Guess I got confused by the placement of it.

coffeecoders•2mo ago
Yeah, I made the mistake of including all features, even ones that change on every refresh like canvas or audio.

The fingerprint should really only use stable features that don’t fluctuate between reloads. That way it’s consistent for the same device.

TazeTSchnitzel•2mo ago
The currency and telephone number prefix info is highly misleading. Those are being assumed based on my IP, not being reported by the browser. Knowing some of this data is fabricated like this makes the site seem less credible.
nervysnail•2mo ago
I wait for the day when all this data collection explodes in a life threatening way for millions of people.
bofadeez•2mo ago
Maybe it's my WARP connection but it's showing almost no useful info. "Unknown" for almost everything.
BinaryIgor•2mo ago
Super interesting project! Out of curiosity, how do you calculate Unique Fingerprint ID and Canvas Deep Fingerprint Hash?
coffeecoders•2mo ago
Thanks! The Unique Fingerprint ID is basically a hash of all the collected fingerprint fields. [1]

The Canvas Deep Fingerprint Hash is higher entropy and includes baseline shapes, emoji rendering, winding rules etc. [2]. It’s meant to capture subtle rendering differences between systems.

1. https://github.com/neberej/exposedbydefault/blob/main/src/mo...

2. https://github.com/neberej/exposedbydefault/blob/main/src/mo...

taxking•2mo ago
This is really cool, the audio thing estimating how many voices are nearby is sort of terrifying
dsp_person•2mo ago
Wdym, the thing that lists how many speech synthesis voices are available?
Tacite•2mo ago
"System Platform" : "MacIntel" Even though the Graphics Renderer is "Apple M1, or similar".
bobbiechen•2mo ago
I believe this comes from the (browser self-reported) navigator.platform, which is reported as MacIntel on all Chrome for Mac versions including Apple Silicon.
informal007•2mo ago
Does I expose my latitude and longitude after visiting a url?
coffeecoders•2mo ago
No, visiting a URL does not automatically expose your exact latitude and longitude.

I just get approximate location from your public IP address via an external IP geolocation API (ipapi.co), which usually gives city-level accuracy.

dtj1123•2mo ago
When I see discussion around browser fingerprinting, the proposed defense generally seems to be that you should blend into the crowd by aquiring a common fingerprint. I wonder how difficult to implement a solution where instead you randomly adjust your fingerprint as you move between sites would be.
not4uffin•2mo ago
On my iPhone that has iOS 26 installed, the page says my device is on iOS 18.7

Am I missing something? That doesn’t math the way math should math.

stevenicr•2mo ago
I remember a post on HN years ago where someone posted a thing that told us all sorts of stuff about our current browser,

I think it even included if your computer was on a desk or moving / shaking, I really want to re-find that.

I know many things have changed with browsers auto sending data, some things are more private and many things are less private.

Someone collab with me on a couple of blog posts about then vs now and examples of what could be inferred by combing data.

potato-peeler•2mo ago
How is uniqueness of devices even calculated?