Automatically replaces the User-Agent after a specified time interval
Depending on your threat model, faking your user agent might make you more fingerprintable, not less. There are ways other than
User-Agent
sniffing to determine what browser you're using, so malicious sites could learn what browser you're really using through other means and then combine that with your randomly changingUser-Agent
to pretty effectively track you. For background, see this GitHub issue. You've been warned.
Get the Plugin! Google Webstore & Firefox Add-ons
User-Agent - a string that is sent along to any website you visit. This is a sort of "fingerprint" your browser leaves behind which contains:
- The name and version of your browser;
- The name of the operating system (Mac, Windows, Linux, etc.) and its version;
- Information about some of the plugins installed on the browser;
- Other information that identifies and exposes you.
This extension has been created to stop data leakage. It automatically replaces User-Agent strings after a specified period of time with a randomly selected one. User-Agent strings can also be set manually. The extension is incredibly lightweight, using very few resources. User-Agent randomization can be customized by the user (what browsers and OS are spoofed, etc.). Exceptions list available with option of wildcards. Protects against Javascript exploits to hide your identity and protect your anonymity.
Thanks to SmudgedMuffin for English localization, and @nazarpc for Ukrainian localization
Take a look here.
For a building extension from sources (and pack as a zip
file) use next commands:
Installed
docker-ce
is required
$ cd /path/to/the/sources
$ make build