[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-dev] Browser extension identification/fingerprinting mitigation?



Hi all,

  I'm looking at possibly replacing the images used by Cupcake with
inline SVG XML, to reduce the possibility of fingerprinting/identifying
Cupcake users who use Chrome [1].  One of the more talked-about methods
of identifying a user's browser extensions is to look for images used by
the extension (in Chrome at least), so this seems to make some amount of
sense. [2]

Does anyone have any thoughts on this?

~Griffin

[1]
https://chrome.google.com/webstore/detail/cupcake/dajjbehmbnbppjkcnpdkaniapgdppdnc
[2] http://blog.kotowicz.net/2012/02/intro-to-chrome-addons-hacking.html

-- 
"Cypherpunks write code not flame wars." --Jurre van Bergen
#Foucault / PGP: 0xAE792C97 / OTR: saint@xxxxxxxxxxxxx

My posts are my own, not my employer's.

_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev