I checked out tor browser in exodus and got to know it have 3 trackers.
Mozilla tracking,Sentry and Google Analytics.
Why is it the case?
Is Tor Private to use after this?
It doesn’t, those are stubs. Exodus will decompile and look for functions and imported APIs, not if the functions are actually filled out. This is a good approach a lot of the time, but has false positives like this occasionally.
Is there a way to tell if an app only has these stubs or if they are fully functional trackers?
Quite true. Actually trying to remove all traces of them may break a number of things, hence the stubs are left. It is just easier this way when lacking a full on, well-payed team of software coders and engineers.
Essentially, false positives.
I save, to check later lol, Im curious now,
But,
Tor browser doesnt block all the fingerprint.
That’s a part of why we should never tweak it, and use it as it is. I guess.I guess too, if there is related ID, they are all the same.
If we dont tweak it, even the data is collected, there is too many associated to the ID, the fingerprint, to be of value.Tor browser is playing on the mass effect too,
Im not tech enginneer, thats just a guess for now.
Saved for later :)Tor browser doesnt block all the fingerprint.
The funny thing about fingerprinting is that blocking fingerprinting is actually your fingerprint.
If you block access to absolutely everything, then not only will the page not function but you will be identified accordingly.
Yeah true, tor browser is playing with the masseffect according to this. That’s why we should not change settings in it