[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: browser fingerprinting - panopticlick

Andrew Lewman wrote:
> On 01/29/2010 04:36 PM, Michael Holstein wrote:
>>> The main cause was the screen resolution.
> https://blog.torproject.org/blog/effs-panopticlick-and-torbutton
>> Running TOR and leaving javascript enabled sort of defeats the 
>> point, doesn't it?
> Not really.  Most of the websites are useless without javascript 
> enabled.  Torbutton protects against known attacks via javascript 
> (yes there's something to be said about unknown attacks...).

(Sigh)...Exactly right; and add flash to that prerequisite.

As we slowly transition to web 2.0, probably the next step is putting
the TOR browser in a VM full of bogus, randomized userid/sysid/network
information - carefully firewalled to allow TOR access only (TOR would
be running somewhere outside the browser VM).

To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/