Steps to reproduce:
Install fresh firefox-esr on Debian Host and on Whonix-Workstation.
Go to Canvas Fingerprinting - BrowserLeaks in Host and Guest with firefox-esr.
You can see that you get same fingerprint
I don’t modify anything on KVM, it was a surprie to see that fingerprint stays the same on Host and Guest.
Is there anything can be done to somehow isolate Guest OS more ?
Do you guys think this canvas fingerprint is huge issue for anonimty? I know that i suppose to use Tor Brower.
But sometimes i need not TorBrowser. Maybe Brave would be good, since it randomize fingerprint by default ?
Also this issues goes beyond web browser. The problem is that from Guest OS attacker can fingerprint Host OS.