[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Spoofing a browser profile to prevent fingerprinting



But I like the idea of fake domain(s) :)
Wouldn't it be possible to implement by any way with TBB (as a part how-to in 
TBB web/blog ? ;)

Btw, am I right to suppose that for not to be fingerprintined when I am 
sometimes on some sites asked to allow the canvas, simply not allow to ?

Thanks.


> Mirimir:
> On 07/29/2014 10:09 AM, OpenPGP wrote:
> > Hi all,
> > 
> > has anybody tried the solution mentioned in http://www.ianonym.com ?
> > I'm just reading all the stuff and information but feel a bit lost :p how
> > to set it al and use it ;)
> 
> My word, that is complicated!
> 
> But even so, if only a few use it with Tor, they probably stand out.
> More generally, the greater the diversity of anonymization options, the
> less anonymity there is :(
> 
> >> Aymeric Vittesal:
> >> ...
> >> Or unless you use something like http://www.ianonym.com, it was designed
> >> to defeat all forms of tracking/fingerprinting with the fake domain
> >> concept and hide your destination even with https.
> >> 
> >> Since it takes control over the whole web page, the js interactions are
> >> sandboxed with a script to "tame" the page, a prototype was working but
> >> maybe it's a bit too complicate...
> >> 
> >> Regards

â

______________________________
http://www.openpgp.org
https://www.gnupg.org
__________________________________________________________________________________

Attachment: signature.asc
Description: This is a digitally signed message part.

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk