The EFF's fingerprint test is nice in that it breaks down a lot of the bits of data used, and lets you know how you compare etc:
> https://coveryourtracks.eff.org/
You quickly discover how difficult it really is to avoid a unique fingerprint.
Lots of folks in this thread are focusing on DNS and VPN to avoid detection, which of course can help, but a huge number of identifiable bits come from your browser's APIs:
User Agent
Screen Size and Color Depth
System Fonts
Hash of canvas fingerprint
Hash of WebGL fingerprint
WebGL Vendor & Renderer
Touch Support
AudioContext fingerprint
Hardware Concurrency
Device Memory
Platform
Language
Timezone
Timezone offset
Browser Plugin Details
etc etc
In Tor got: "Our tests indicate that you have you have strong protection against Web tracking."
In normal Firefox: "uBlock Origin has prevented the following page from loading:
https://eviltracker.net/kcarter-reporting-nojs?a="
In normal Firefox with 'real tracking company' ON (default): "uBlock Origin has prevented the following page from loading:
https://trackersimulator.org/kcarter-reporting-nojs"
Sort of failed?
> https://coveryourtracks.eff.org/
I get "Our tests indicate that you have some protection against Web tracking, but it has some gaps." but nothing of too much importance I think.
I use a VPN and NextDNS.io.
The real test is whether the site believes you to be unique, which is listed separately. It reports me as "Our tests indicate that you have strong protection against Web tracking.", but I'm still uniquely identifiable.
Do not trust the EFF !!!