[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] TBB users, please give 1 minute of your time for science
There is always a risk of bugs and exploits in the code. Having a security
researcher study these gives us better knowledge of the current flaws and
how to correct them. If you truly trust the browsers current security this
should have no downside, otherwise it is the path to improving it.
On 25 Apr 2017 08:21, "grarpamp" <grarpamp@xxxxxxxxx> wrote:
> On Tue, Apr 25, 2017 at 2:15 AM, Mirimir <mirimir@xxxxxxxxxx> wrote:
> > On 04/24/2017 07:00 PM, cube@xxxxxxxxxxxxxxxxx wrote:>>
> >> Could you please do me (and science) a favor and go to my site (
> >> https://browserprint.info ) using the Tor Browser Bundle and submit a
> >> fingerprint, making sure to fill in the optional questionnaire?
> >> At the moment I'm working on detecting a person's underlying
> >> operating system and browser family using their browser fingerprint.
> >> The aim of this is to detect and defeat browser spoofing. The number
> >> of Tor Browser Bundle users who have gone to my site and done this is
> >> extremely low, so I'm not able to properly train my detector to
> >> defeat the TBB, nor am I able to gauge how effective my detector is
> >> against the TBB.
> >> Rest assured that I will not use your data for anything malicious,
> >> nor will I attempt to deanonymise you in any way.
> > Not malicious, you say? Browser spoofing is a key feature of Tor
> > browser. Defeating that sounds rather malicious.
> Were it to be defeated, the feature sounds pretty weak.
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsubscribe or change other settings go to
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to