TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Advanced Tor Browser Fingerprinting

135 点作者 hachiya大约 9 年前

9 条评论

gburt大约 9 年前
&gt;The most intersting fingerprinting vector I found on Tor Browser is getClientRects. Is strange that reading back from a canvas has been prevented but simply asking the browser javascript API how a specific DOM elements has been drawn on the screen has not been prevented or protected in any way.<p>This isn&#x27;t as strange as he makes it sound, it is done to prevent the link color history attack [1]. Most of the other CSS properties aren&#x27;t allowed on :active or :visited modifiers.<p>[1] <a href="http:&#x2F;&#x2F;dbaron.org&#x2F;mozilla&#x2F;visited-privacy" rel="nofollow">http:&#x2F;&#x2F;dbaron.org&#x2F;mozilla&#x2F;visited-privacy</a>
ycmbntrthrwaway大约 9 年前
Unless JavaScript is disabled, this arms race is going to continue forever.
评论 #11237449 未加载
评论 #11236660 未加载
评论 #11235750 未加载
lucb1e大约 9 年前
Lots of ideas, many of which I&#x27;ve had as well, but I am missing conclusions. On the demo page it tells me my CPU benchmark and some scrolling measurements. Great, but how unique was that now? And how are you going to make the data points into a fingerprint? Because next time I scroll, I will totally scroll a millisecond differently.
评论 #11237760 未加载
评论 #11236280 未加载
mirimir大约 9 年前
I don&#x27;t believe that any of these will link different Whonix instances on the same host machine. Using Tor browser in the same OS that you use for general work is <i>not</i> secure. Even sharing the same host machine is insecure, where anonymity really matters.
bugmen0t大约 9 年前
The author is missing the point of the Tor Browser. They don&#x27;t try to make fingerprinting impossible. They want to make the outcome uniform across all users. See &quot;Strategies for Defense: Randomization versus Uniformity&quot; in their design docs [1].<p>And (as other said) uniformity is increased when using an anonymous&#x2F;privacy enhancing operating system like Tails or WHONIX underneath.<p>[1] <a href="https:&#x2F;&#x2F;www.torproject.org&#x2F;projects&#x2F;torbrowser&#x2F;design&#x2F;#fingerprinting-linkability" rel="nofollow">https:&#x2F;&#x2F;www.torproject.org&#x2F;projects&#x2F;torbrowser&#x2F;design&#x2F;#finge...</a>
em3rgent0rdr大约 9 年前
Most of these are nullified by disabling JavaScript.
gavazzy大约 9 年前
Disable javascript. Disable user-agent. Run from VM.
Paul_S大约 9 年前
Demo does nothing for me. I&#x27;m dubious how repeatable or unique those results are.
akavel大约 9 年前
Did the author of the article submit his findings to the Tor Project?
评论 #11235708 未加载
评论 #11236316 未加载
评论 #11237021 未加载