[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Audio fingerprinting


A wide-scale study of online trackers carried out by researchers at
Princeton University has identified a new technique being used to try to
strip web users of their privacy, as well as quantifying the ongoing
usage of some better-known tracking techniques.

The new technique unearthed by the study is based on fingerprinting a
machineâs audio stack via the AudioContext API. So itâs not collecting
sound played or recorded on a machine but rather harvesting the audio
signature of the individual machine and using that as an identifier to
track a web user.

I understand that these methods are not possible without javascript, are
The example provided in the webpage:
uses fingerprintjs2 library.

Any thoughts?

Attachment: signature.asc
Description: OpenPGP digital signature

tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to