- Edited
After some testing, it appears to me that the stance Orion has taken may not bother sophisticated fingerprinting tools, such as fingerprint pro (aka fingerprint.js). The URL for the CDN can be blocked but that doesn't stop the library from being bundled in a website's own first party scripts.
See https://fingerprint.com/demo/ to show how Orion users seem to be easily fingerprintable in the wild using today's technology.
It doesn't seem to matter whether I use Orion's built in content blocking, or uBlock with lots of lists - I am accurately fingerprinted every time. However this is not the case with a hardened copy of LibreWolf using containers; with this I am not uniquely fingerprinted. LibreWolf browser utilises uBlock AND the evasion techniques disregarded by Orion.
Assuming that most sites won't go to the lengths the demo site has to not load scripts from identifiable domains or URLs for their libraries, I checked to see how the paid version of Fingerptint Pro tool might be used in practice. If the developer included the script using npm and bundles their javascript, it would be undetectable by a content blocker. I dont know how the intelligent tracking prevention works so I am unable to say if thius could detect the code and isolate it. It would be good to create a website where this technology is put to use in order to test Orion against it, since apparently 12% of the top largest 500 websites use this fingerprinting library.
I feel like the way to settle this is "proof is in the pudding". If we can build a site that uses commly available fingerprinting libraries to show that Orion can evade them, that would settle the privacy argument. As it stands, I do feel a little uneasy using the browser - even though I love it.
Excerpt from "What Works (Sometimes) to Prevent Browser Fingerprinting":
There are a few ways to mitigate browser fingerprinting techniques, but these are not foolproof. Some browsers offer browser fingerprinting mitigation strategies as an in-built feature. For example, Firefox allows users to block third-party requests to sites known to utilize fingerprinting, providing added protection but would not be able to catch first-party scripts.
Excerpt from "Creating a Fingerprint":
It is worth restating that Fingerprint generates an accurate visitor for each browser-device combination and not for each device. Because Fingerprint visitorIDs are derived from many browser attributes—some universal, others vendor-specific—a website visitor using both Chrome and Firefox will most likely be assigned a separate, unique visitorID for each browser type. This means a user could escape being associated with a previous visit if they used a different browser, though this trick would only work as long as they had new browsers.
More info on how it works: https://dev.fingerprint.com/docs/understanding-our-995-accuracy
The only solution I see to this is for there to be some way to scan the contents of scripts to discover bundled trackers (unless this is what ITP does?), and/or introducing the same mitigation methods as Firefox/LibreWolf/Tor do that obfuscate their browser signals and prevent certain third-party cookies from being set.