tracker-radar icon indicating copy to clipboard operation
tracker-radar copied to clipboard

Reporting a large list of suspicious browser fingerprinting scripts

Open jsu6 opened this issue 7 months ago • 2 comments

Hello,

I have a system that crawls top domains and collects browser API usage data. Building on prior research that measures entropy exposed by browser APIs, the system estimates the entropy gathered by each script. Using this approach, I got an extensive list of scripts that are suspicious for browser fingerprinting. I would like to contribute this list along with browser API usage to the Tracker Radar but am unsure of the best way to proceed. I’m happy to provide additional details if needed and would greatly appreciate any feedback!

jsu6 avatar Apr 14 '25 20:04 jsu6

@jsu6 You might want to provide that data to blocklist maintainers as i am sure they would be interested in that data. E.g. https://github.com/hagezi/dns-blocklists/ https://github.com/badmojr/1Hosts/ https://github.com/AdguardTeam/

ghost avatar Sep 04 '25 12:09 ghost

@bxn8 Thanks for letting me know these maintainers! I will submit my findings to them.

jsu6 avatar Sep 04 '25 15:09 jsu6