This is exactly how ebpf was implemented for the Linux kernel. You can build watchdog processes that can see what’s happening in the kernel and build kernel interrupts but it’s actually all executed in user space and not rewriting the kernel itself. Since it’s a proper api, it also means it’s incredibly hard to fundamentally break the system, unlike when you’re just blowing away kernel code with your own shit like all these security products do.
unique screens have unique canvas fingerprinting.
Exactly what I just said? Don’t use unique screens and you are less identifiable. The most anonymous browser is a freshly wiped two year old Apple device running safari or chrome from a university campus or coffee shop. A million other laptops have the same base canvas fingerprint.
Fewer people use Linux. Fewer people use specialized browsers. Fewer people have external displays. All those things make you easier to fingerprint than a vanilla machine.
Is it possible you misread what I typed?
FYI: Home Depot sells ratchet straps and rags for less than $10. First time I made this mistake with my car I just padded the roof with rags and ratchet strapped the shit to the roof.
The next time I went I had crossbars and used the same ratchet straps.
I’ve hauled more shit in my $16k sedan on $200 crossbars than 90% of $90k+ superduty pickup owners