[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Spoofing a browser profile to prevent fingerprinting
On 07/29/2014 10:09 AM, OpenPGP wrote:
> Hi all,
>
> has anybody tried the solution mentioned in http://www.ianonym.com ?
> I'm just reading all the stuff and information but feel a bit lost :p how to
> set it al and use it ;)
My word, that is complicated!
But even so, if only a few use it with Tor, they probably stand out.
More generally, the greater the diversity of anonymization options, the
less anonymity there is :(
>> Aymeric Vittesal:
>> ...
>> Or unless you use something like http://www.ianonym.com, it was designed
>> to defeat all forms of tracking/fingerprinting with the fake domain
>> concept and hide your destination even with https.
>>
>> Since it takes control over the whole web page, the js interactions are
>> sandboxed with a script to "tame" the page, a prototype was working but
>> maybe it's a bit too complicate...
>>
>> Regards
>
> â
>
>
> ______________________________
> http://www.openpgp.org
> https://www.gnupg.org
> ______________________________________________________________
>
>
>
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk