[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #17423 [Tor Browser]: Look into Yan's browser fingerprinting tricks
#17423: Look into Yan's browser fingerprinting tricks
--------------------------------+--------------------------
Reporter: arthuredelstein | Owner: tbb-team
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: tbb-fingerprinting | Actual Points:
Parent ID: | Points:
Sponsor: |
--------------------------------+--------------------------
Comment (by zyan):
(yan here)
I am fairly certain that the 301-redirect cache timing attack mentioned at
the end is not feasible thanks to #1517, at least.
Note there is an chrome bug for a non-timing HSTS attack that has the same
fingerprinting impact as Sniffly. I believe it works in Firefox as well.
https://code.google.com/p/chromium/issues/detail?id=436451#c34
Chrome fixed it and then reverted the fix because it broke things. TBB
should probably just copy their original fix.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17423#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs