[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #3914 [Tor Browser]: Experimental Website fingerprinting defense



#3914: Experimental Website fingerprinting defense
---------------------------------------------+------------------------------
 Reporter:  mikeperry                        |          Owner:  mikeperry
     Type:  enhancement                      |         Status:  new      
 Priority:  normal                           |      Milestone:           
Component:  Tor Browser                      |        Version:           
 Keywords:  MikePerryIterationFires20110911  |         Parent:           
   Points:                                   |   Actualpoints:           
---------------------------------------------+------------------------------
 For grins, I decided to make an experimental fingerprinting defense to
 defend against http://lorre.uni.lu/~andriy/papers/acmccs-
 wpes11-fingerprinting.pdf.

 Basically the defense is to enable HTTP pipelining and to randomize the
 size and the order of the pipeline queue for each connection. It's easy to
 do and doesn't cost us any overhead.

 I think we should ask the researchers to test it out for us or give us
 their source code.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3914>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs