Review Article
A Survey of Browser Fingerprint Research and Application
Table 3
Summary of browser fingerprinting defense.
| Methods of defense | Representative work | Advantage | Disadvantage |
| Browser protection plug-in | [32, 33] | Development and application are convenient | The browser plug-in itself can also become an identified feature | Randomization method | [35ā37] | Randomization can disguise as a desired feature while protecting user privacy | Abnormal combinations of random features are quickly identified as false identities | Uniform methods | [38, 39] | Unification facilitates application development and processing | The unification of a single or part of the user still has the recognition value, and the advantages of unification require industry-wide efforts | Other protective way | [40ā44] | Hiding browser fingerprints through browsers or modifying network agents is generally better defensive | Users are required to change their browser or modify their network devices |
|
|