[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #30862 [Applications/Tor Browser]: 10ms time precision via EXSLT date-time function
#30862: 10ms time precision via EXSLT date-time function
---------------------------------------------+--------------------------
Reporter: gk | Owner: tbb-team
Type: defect | Status: new
Priority: High | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: tbb-fingerprinting-time-highres | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
---------------------------------------------+--------------------------
Comment (by gk):
Replying to [comment:5 Thorin]:
> Am I missing something here? I can already get 1ms timing via other
means: see Fantastic Timers and Where to Find Them (gk: I sent you a copy
a month ago)
Yes, there are ways to get around fingerprinting defenses. But that is not
a reason to not implement defenses in the first place. You close hole by
hole raising the bar for the attacker. Remeber: you don't win the
fingerprinting game by closing _all_ the holes but by making it hard
enough that trackers lose interest in this technique and/or don't get
usable results out of it anymore.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30862#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs