What 404 does
404 addresses the web research layer by rewriting the fingerprint surfaces that remote sites use to recognize or correlate a browser over time.
Human rights organizations
Empirical studies have shown that individuals tend to avoid controversial topics online, limit participation in forums, or refrain from joining certain organizations if they believe their digital footprint is monitored. Even when surveillance does not result in direct action, the perception of being watched changes behavior.
The threat is not only exposure. It is the chilling effect that changes what researchers are willing to read, monitor, or revisit.
Operational context
Human rights organizations investigate governments, militaries, police units, militias, corporations, and armed groups that may have strong reasons to watch who is visiting their public web properties. In that context, browser fingerprinting is the passive, low-cost end of surveillance infrastructure. It does not require malware or a zero-day. It only requires the site to log and correlate technical signals from each visit.
That matters because the surveillance burden is already well documented. A 2024 report to the Inter-American Commission on Human Rights found that in some countries nearly all journalists and human rights defenders surveyed suspected that they had been targeted for surveillance because of their work. The web research layer fits directly into that broader risk model.
The gap in current tools
The usual toolkit for at-risk work is sensible: VPNs, Tor, Signal, hardened devices, and secure communication channels. Those tools address important problems. They do not remove the device fingerprint that can still travel with each web request regardless of network path.
What 404 does
That limitation should be stated plainly. 404 is meant to reduce externally visible browser correlation during web research. It is not a communications platform, it does not defend against endpoint compromise, and it does not replace disciplined operational security.
What it does do is narrow one specific exposure: the ability of remote sites to tie repeated visits back to the same browser identity through a combination of TLS signatures, headers, browser APIs, graphics behavior, audio behavior, and lower network signals.
404 addresses the web research layer by rewriting the fingerprint surfaces that remote sites use to recognize or correlate a browser over time.
The point is not to spray random values across the stack. It is to present one internally consistent browser identity across TLS, headers, JavaScript-visible signals, and packet-level values.
404 does not protect communications, does not stop spyware, and does not replace operational security, compartmentalization, or secure-device practices.
It sits beside the rest of the security toolkit. VPNs, Tor, Signal, hardened devices, and disciplined workflows still matter. 404 covers the browser fingerprinting layer specifically.
For sophisticated human rights teams, the right framing is additive rather than substitutive. 404 belongs alongside existing digital security practices, not in place of them.
How it fits
The Berkeley Protocol explicitly advises investigators to manage attribution risk and to use secure technical environments for open source investigations. 404 fits that guidance at one precise layer: the browser fingerprint that public sites can collect every time a researcher loads a page, checks an update, or returns to monitor a subject over time.
For human rights organizations, that distinction matters. The goal is not to claim complete protection. It is to remove one passive, low-cost surveillance vector that otherwise sits untouched between the browser and the site being investigated.