How to prevent Hardware Model being read by software on Linux(and potentially serial number as well)

Hi guys

I found that any software installed on linux system can read the brand, model, hardware specs, system version without root. Knowing that I can choose open source and privacy friendly software that does not collect such information, using Tor Browser, buy the gears with cash, or using Whonix VM to mitigate this risk. On Tails, however, without virtualization, if I wish to run Telegram(given it is a unencrypted spyware) in certain scenario and try my best to hide the device information to reduce fingerprinting. Is there anything I can do to hide or spoof the device model?

Is there any chance the serial number get leaked without root? How can I mitigate this risk?

guest
0 Comments
Inline Feedbacks
View all comments

Recent Posts

crosspost

Testing MrShoeys MDMA (Bigdog) by /u/bigdog729 · 5 hours ago in /d/Test4Pay 2 votes · 12 comments

Read More »