[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] browser fingerprinting



http://arstechnica.com/tech-policy/2010/01/even-without-cookies-a-browser-leaves-a-trail-of-crumbs/

https://panopticlick.eff.org/self-defense.php

Anonymity is quite easily broken, if cookies cannot managed (e.g. like
in certain browsers) and if javascript is enabled. As far as we see,
Firefox in the Tor bundle disables javascript, right?
Javascript allows to access the local IP address and files, which host the
local IP address. That`s why Tor and Javascript do not go together.
I miss in FireFox a dedicated cookie management.

Besides these two serious problem there is browser fingerprinting.
Incriminating are the details of a particular browser plugin setup (e.g.
only 1 in 20,830 browsers have an identical plugin load) and the list of
system fonts: 1 in 13,886).

How likely is it, that another one is like me, one of 20.830 and one of
13.886.

That leads to the question: How can Tor deliver websites without these
settings? Browsing without a browser: e.g. a screenshot in a picture viewer
would not offer these risks.

Ideas? comments? Regards
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk