On 19/08/13 04:07, Brian Smith wrote:
>> When risk is there to a user of having a network eavesdropper able to
>> tell that they are using a particular browser? If I had an exploit for a
>> particular browser, I'd just try it anyway and see if it worked. That
>> seems to be the normal pattern.
> 
> One example is Tor: it tries to look like "a normal browser" so that it is
> hard to detect that you are using Tor. And, if Tor is properly configured
> then the network attacker will never see any non-TLS traffic.

But if Tor Browser is based on Firefox, then it'll have the same TLS
signature as Firefox anyway?

Gerv

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to