[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Tor browser can be fingerprinted
The graphics subsystem, are being used today.
100%. No doubt. If your targeted, this may be used to find you. It takes
a lot resources but its happing right now. Opening one domain at a time
helps, but the longer your connected and the more you down load more
identifiable you are.
If your not targeted, you have nothing to worry about.
On Wed, Sep 11, 2013 at 4:43 PM, Roger Dingledine <arma@xxxxxxx> wrote:
> On Wed, Sep 11, 2013 at 12:50:41PM -0400, Marthin Miller wrote:
> > 1024bit RSA keys which can be cracked in a few hours
>
> I believe this to be false currently.
>
> (But that doesn't mean we shouldn't fix it, because it will become true
> some time in the next few decades, and we don't know when that will be.
> (Good thing we're fixing it.))
>
> > Also if you let users choose how much security they want that's better
> >(for example choose high padding and time delay on relays if security
> >have more priority than speed)
>
> Unfortunately, this one is more complex than you imply as well. Take a
> look at "Anonymity Loves Company: Usability and the Network Effect"
> for much more discussion here:
> http://freehaven.net/anonbib/#usability:weis2006
>
> --Roger
>
> --
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsusbscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk