On Saturday, March 28, 2020 at 11:23:55 PM UTC+8, 
rememberi...@gmail.com wrote:
> I am looking to lock-down my browser as much as possible.  I am going back and forth between the Tor Browser and straight FF (with Tor-based suggestions).  With the former I use a proxy service as Tor is too slow.  I have also played with Chameleon to spoof the TZ to mimic where I am coming from. 
Hi, I believe that set the pref "privacy.resistFingerprinting" is true in about:config can meet your need. "privacy.resistFingerprinting" is combining several resist-fingerprint patches for Tor Browser, which timezone is spoofed to 'UTC', the Locale is spoofed to en-US and more... The details could be found on 
https://wiki.mozilla.org/Security/Fingerprinting#Technical_Details, 
https://wiki.mozilla.org/Security/Tor_Uplift/Tracking
> I am using 
deviceinfo.me to validate what the browser reveals.  While it shows the system time as being the TZ I set in Chameleon, there is a value called 'Local Time' that seems to show my actual TZ (EST/EDT).
 It calculates the local time by your IP address, not your browser tell. Most GeoIP databases provide timezone information about IP.
-- 
Tom