[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #5282 [Tor Browser]: Randomize non-pipelined requests to defend against traffic fingerprinting
#5282: Randomize non-pipelined requests to defend against traffic fingerprinting
-------------------------+--------------------------------------------------
Reporter: mikeperry | Owner: mikeperry
Type: defect | Status: new
Priority: major | Milestone: TorBrowserBundle 2.3.x-stable
Component: Tor Browser | Version:
Keywords: | Parent:
Points: | Actualpoints:
-------------------------+--------------------------------------------------
According to Martin Henze (who works with Andriy Panchenko), the defense
in #3914 is inadequate due to the fact that many sites forcibly disable
pipelining.
He implemented a defense that randomizes non-pipelined HTTP requests as
well, but it may need some cleanup. It also needs testing against their
framework still, I believe.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5282>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs