[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Spoofing a browser profile to prevent fingerprinting



Hi all,

has anybody tried the solution mentioned in http://www.ianonym.com ?
I'm just reading all the stuff and information but feel a bit lost :p how to 
set it al and use it ;)

> Aymeric Vittesal:
> ...
> Or unless you use something like http://www.ianonym.com, it was designed
> to defeat all forms of tracking/fingerprinting with the fake domain
> concept and hide your destination even with https.
> 
> Since it takes control over the whole web page, the js interactions are
> sandboxed with a script to "tame" the page, a prototype was working but
> maybe it's a bit too complicate...
> 
> Regards

â


______________________________
http://www.openpgp.org
https://www.gnupg.org
______________________________________________________________

Attachment: signature.asc
Description: This is a digitally signed message part.

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk