[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #17423 [Tor Browser]: Look into Yan's browser fingerprinting tricks



#17423: Look into Yan's browser fingerprinting tricks
--------------------------------+--------------------------
 Reporter:  arthuredelstein     |          Owner:  tbb-team
     Type:  defect              |         Status:  new
 Priority:  Medium              |      Milestone:
Component:  Tor Browser         |        Version:
 Severity:  Normal              |     Resolution:
 Keywords:  tbb-fingerprinting  |  Actual Points:
Parent ID:                      |         Points:
  Sponsor:                      |
--------------------------------+--------------------------

Comment (by zyan):

 Replying to [comment:2 gk]:
 > We have #6458 for the HSTS linkability issue.

 Can you confirm my understanding of #6458?
 1. user visits https://thirdparty.com, gets HSTS pin
 2. user visits http://example.com with <img src="http://thirdparty.com";>.
 the browser makes the request over HTTP anyway because the user has never
 visited thirdparty.com on example.com before.

 I think that would stop the Sniffly attack.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17423#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs