Review Article

A Survey of Browser Fingerprint Research and Application

Table 3

Summary of browser fingerprinting defense.

Methods of defenseRepresentative workAdvantageDisadvantage

Browser protection plug-in[32, 33]Development and application are convenientThe browser plug-in itself can also become an identified feature
Randomization method[35ā€“37]Randomization can disguise as a desired feature while protecting user privacyAbnormal combinations of random features are quickly identified as false identities
Uniform methods[38, 39]Unification facilitates application development and processingThe unification of a single or part of the user still has the recognition value, and the advantages of unification require industry-wide efforts
Other protective way[40ā€“44]Hiding browser fingerprints through browsers or modifying network agents is generally better defensiveUsers are required to change their browser or modify their network devices