[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #31512 [Applications/Tor Browser]: Fingerprinting of Tor Browser
#31512: Fingerprinting of Tor Browser
--------------------------------------+--------------------------
Reporter: thelamper | Owner: tbb-team
Type: enhancement | Status: closed
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Major | Resolution: invalid
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+--------------------------
Comment (by Thorin):
Replying to [comment:8 thelamper]:
> Does having javascript disabled make it harder to fingerprint individual
Tor users
Absolutely. Reducing the attack surface (by disabling JS) removes a
**lot** of the FPing metrics possible.
> Or is it generally viewed by the Tor Project as safe (ie non-
fingerprintable) for Tor users to browse the web with javascript enabled?
My view is that it's always a work in progress but the anti-FPing in Tor
Browser is very mature at this stage. Instead, adapt to your threat model,
and use the security slider.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31512#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs