Firefox implement Tor-Based Privacy Feature
If you have wondered how ads keep popping up on your monitor that relate to some of the sites you had recently visited, it is based on a technology called “canvas fingerprinting.”
This is very common with almost all browsers except the Tor browser, which is largely used by dark web users and their associated communities.
However, Mozilla Firefox is incorporating a feature where canvas fingerprinting on its browser is not permitted unless a user expressly permits it.
This is an interesting development, since Tor itself runs on the back of the Firefox browser, borrowing several of its features. This time, it would be the reverse.
Private Browsing Experience is Critical Factor
Behind this latest move by the Firefox browser is the need to provide users absolute privacy and to prevent advertisers from bombarding messages on their screens that would distract their attention.
More than anything else, there is also the predominant demand from internet users that it should be left to them to choose which pages they wish to visit and what products they want to buy and when.
The aspect that concerns internet users the most is that canvas fingerprinting happens without their knowledge. It is an entirely different preposition when you visit a site and you voluntarily leave your details, like contact numbers or email IDs, and you are contacted later with commercial messages that try to convince you to buy something.
This is a downright invasion of your privacy, and this step by the Firefox browser is expected to be widely welcomed all-round.
There is an extension for Chrome that can partially alleviate this privacy hole by blocking these hidden crawlers