[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #11949 [Firefox Patch Issues]: Randomize Tor Browser Fingerprint (was: Randomize Browser Fingerprint..)
#11949: Randomize Tor Browser Fingerprint
--------------------------------------+-----------------------
Reporter: mt2014 | Owner: mikeperry
Type: enhancement | Status: new
Priority: normal | Milestone:
Component: Firefox Patch Issues | Version:
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
--------------------------------------+-----------------------
Changes (by gk):
* priority: blocker => normal
* component: Torbutton => Firefox Patch Issues
Comment:
Replying to [ticket:11949 mt2014]:
> TorBrowser still can be easily fingerprinted:
>
> 1. check your fingerprint ID here & copy it to notepad:
> http://fingerprint.pet-portal.eu/
> http://www.browserleaks.com/canvas
>
> 2. Do whatever you can to delete your trace (dom storage, html5 storage,
cookie, flash cookie, reinstall browser)
>
> 3. check your fingerprint once more from above sites. 99% it will still
be same!
That's exactly the idea and not a bug: if we make it possible that all Tor
Browser users look the same we have defeated the fingerprinting as no
particular Tor Browser user may be singled out due to some deviation from
the Tor Browser "norm". See again the current design documentation
https://www.torproject.org/projects/torbrowser/design/#fingerprinting-
linkability .
That said, there is research going on whether we can't defeat
fingerprinting by randomizing properties as you suggest. So far, I am not
convinced by the approaches and analysis yet.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11949#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs