Librewolf - helps prevent the more complicated fingerprinting tactics like viewports, cookie isolation, window object serializing, javascript, drm extensions, dom tricks, html canvas rendering. Chameleon add-on - selectively rotates and randomizes accept language and user agents, in both http and javascript navigator objects - Adds a X-Forwrded-For header to a random IP (sometimes internal IPs can be used to trick load balancers to trust your connection) sometimes causing endpoints to think your connection is proxied by another network - Removes etag and referrer headers - allows disablement of WebRTC features that use central public servers - about a dozen other protections with versioned CSS features, element rendering like borders and scaling, media device features (and how they're denied whether the user clicked the button or it was automatic), and font availability and stuffs uBlock origin add-on - can be used to isolate scripts between parties or prevent them from running - prevents local network scanning - prevents sending of CSP reports also used to track users when CSP failures occur (which they will with strict isolation rules) - prevent 3rd party connections to CDN services also used to track users Running a local recursive DNS resolver - prevents dns leaks by malicious first parties Using multiple VPN services and creating policies to route traffic across them If I'm not careful though, I can look like a Chinese native in rural Illinois who also near a warehouse in New Jersey, using a 10 year old Android smarphone with Internet Explorer, on a restrictive wifi network, that just can't seem to load images over 100kb in size... I wonder if that's traceable?