

I asked them exactly that hehe
So, technically the sites you are redirecting from will never know you tried to access them and the addon is not interacting with any page, but the dev didn’t address/think of probing. I don’t have enough tech knowledge to confirm the addon won’t react to anything, thus making itself known. I don’t know which probing techniques there are and how all those resist-fingerprint and sandboxing settings from privacy-conscious browsers work against it… it does, however, sound like a sophisticated and resource-consuming method that I don’t think they would be using on regular internet unless they have specific targets, so if they have such probing techniques they are probably using it on IPs going through the TOR network (and you shouldn’t use any addon on Tor anyway).
It’s all about your threat model, if you just want to avoid regular tracking and profiling the addon should be fine, now if you are afraid of some sophisticated and resourceful threat actors targeting you, don’t take your chances with any addon.
owning them libs