[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #3914 [Tor Browser]: Experimental Website fingerprinting defense
#3914: Experimental Website fingerprinting defense
---------------------------------------------+------------------------------
Reporter: mikeperry | Owner: mikeperry
Type: enhancement | Status: new
Priority: normal | Milestone:
Component: Tor Browser | Version:
Keywords: MikePerryIterationFires20110911 | Parent:
Points: | Actualpoints:
---------------------------------------------+------------------------------
For grins, I decided to make an experimental fingerprinting defense to
defend against http://lorre.uni.lu/~andriy/papers/acmccs-
wpes11-fingerprinting.pdf.
Basically the defense is to enable HTTP pipelining and to randomize the
size and the order of the pipeline queue for each connection. It's easy to
do and doesn't cost us any overhead.
I think we should ask the researchers to test it out for us or give us
their source code.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3914>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs