[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #5282 [Firefox Patch Issues]: Randomize non-pipelined requests to defend against traffic fingerprinting
#5282: Randomize non-pipelined requests to defend against traffic fingerprinting
-------------------------------------+--------------------------------------
Reporter: mikeperry | Owner: mikeperry
Type: defect | Status: closed
Priority: major | Milestone: TorBrowserBundle 2.3.x-stable
Component: Firefox Patch Issues | Version:
Resolution: fixed | Keywords: MikePerry201204
Parent: | Points: 4
Actualpoints: 12 |
-------------------------------------+--------------------------------------
Changes (by mikeperry):
* status: needs_review => closed
* points: => 4
* resolution: => fixed
* actualpoints: => 12
Comment:
Ok, this is all set and merged. I had to alter the patch a bit to ensure
request randomization. I also pinged Henze and Panchenko with the updated
version.
I also looked into the SPDY spec briefly. It has the ability to store
arbitrary state in the browser.. We'll want to neuter that, as well as
reduce its insanely long keepalive duration. I have not put deep thought
into how to do request randomization or stream limiting in spdy, though
(or if it is really beneficial anymore in the face of the ultra-efficient
request pipelining).
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5282#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs