Browser fingerprinting protection for everybody.
Chameleon is a Chrome privacy extension that π detects fingerprinting-like activity, and β¨ protects against fingerprinting, currently by making Chrome look like Tor Browser.
Chameleon detects font enumeration and intercepts accesses of fingerprinting-associated JavaScript objects like Window.navigator.
The number over Chameleon's button counts the number of distinct attempts to collect information about your browser on the current page. Higher numbers suggest fingerprinting might be taking place.
Since Tor users are supposed to all look alike, Chameleon attempts to blend in by altering request headers and JavaScript properties to match Tor Browser's values.
To start with, Chameleon covers Panopticlick's fingerprinting set, with more complete coverage in the works.
Chrome without Chameleon:
Chrome with Chameleon:
Tor Browser:
To manually load Chameleon in Chrome, check out (or download and unzip) this repository, go to chrome://extensions/
in Chrome, make sure the "Developer mode" checkbox is checked, click on "Load unpacked extension..." and select the chrome folder inside your Chameleon folder.
To update manually loaded Chameleon, update your checkout, visit chrome://extensions
and click on the "Reload" link right under Chameleon's entry.
You could also generate an installable CRX package. See below for details. To install from a CRX package, drag and drop the package file onto the chrome://extensions
page.
npm install
to install dev dependencies.npm run lint
to check JS code for common errors/formatting issues.npm run watch
to monitor extension sources for changes and regenerate extension JS bundles as needed. Leave this process running in a terminal as you work on the extension. Note that you still have to reload Chameleon in Chrome from thechrome://extensions
page whenever you update Chameleon's injected script or background page.npm run dist
to generate an installable CRX package. This requires having the signing key in~/.ssh/chameleon.pem
. To get a key, visitchrome://extensions/
in Chrome and click on the "Pack extension..." button to generate a CRX manually.
CSS sprites were generated with ZeroSprites.
Some sites use Flash detection before loading Flash content. Since Chameleon overloads window.navigator.plugins
, these sites end up showing error messages about needing to install or upgrade Flash.
Fingerprinting technique | Detection | Protection | Notes |
---|---|---|---|
Request header values | β | β | detection of passive fingerprinting requires an indirect approach |
window.navigator values | β | β | partial protection (navigator.javaEnabled not yet overriden, ...) |
window.screen values | β | β | |
Date/time queries | β | β | partial protection (need to adjust the entire timezone, not just getTimezoneOffset) |
Font enumeration | β | β | unable to override fontFamily getters/setters on the CSSStyleDeclaration prototype in Chrome; needs more investigation |
CSS media queries | β | β | needs investigation |
Canvas image data extraction | β | β | protection impeded by image rendering differences between Chrome and Firefox |
Request header ordering/checksum, window.navigator checksum, checksumming in general | ? | ? | needs investigation |
Flash/Java-driven queries | β | β | plugins need to be switched to click-to-play by default |
Third-party cookies | β | β | need to disable by default |
JS/rendering engine differences | β | β | needs investigation |
Packet inspection/clock skew (?) | β | β | not possible in a browser extension |
Mozilla Public License Version 2.0