[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] TBB Memory Allocator choice fingerprint implications



Btw Hardened Malloc does not require recompilation of TBB.

Compilation of Hardened Malloc is easy.

https://github.com/GrapheneOS/hardened_malloc

It then can be used with TBB or any application using LD_PRELOAD
environment variable.

LD_PRELOAD='/path/to/libhardened_malloc.so' /path/to/program

Just now created:
consider using Hardened Malloc for better security in TBB
https://trac.torproject.org/projects/tor/ticket/31440

Tom Ritter:
> On Sat, 17 Aug 2019 at 15:06, procmem@xxxxxxxxxx <procmem@xxxxxxxxxx> wrote:
>> Question for the Tor Browser experts. Do you know if it is possible to
>> remotely fingerprint the browser based on the memory allocator it is
>> using? (via JS or content rendering)
> 
> Fingerprint what aspect of the browser/machine?


Browser web fingerprinting. The fingerprint that remote websites can see.

Can web servers guess that a different memory allocator (Hardened
Malloc) is being used due to difference in performance or other glitches?

Cheers,
Patrick
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev