[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #20214 [Applications/Tor Browser]: Ultrasound Cross Device Tracking techniques could be used to launch deanonymization attacks against some users
#20214: Ultrasound Cross Device Tracking techniques could be used to launch
deanonymization attacks against some users
--------------------------------------+--------------------------
Reporter: VasiliosMavroudis | Owner: tbb-team
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+--------------------------
Comment (by VasiliosMavroudis):
Replying to [comment:3 bugzilla]:
> At a first glance it looks like OP came here with a tinfoil hat,
especially as most 44.1/48 kHz formats are not ultrasound capable. But, in
general, there is some chance to become deanonymized during playback of
watermarked media (e.g. from YouTube) in a range where compromised devices
can record the differences in sound.
>
> > The prompt would only serve as an annoyance that the user would learn
to ignore.
> >
> Warning as for maximization should be enough.
You seem to imply that it's not possible to use ultrasounds to perform
this attack. However, there are already a few companies using this
technology, e.g., SilverPush, Lisnr.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20214#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs