Re: [tor-talk] TBB uses orange Firefox icon in Linux panel

2017-04-25 Thread Joe Btfsplk

On 04/24/2017 08:47 PM, goody2shoes wrote:


On 04/24/2017 05:43 PM, Joe Btfsplk wrote:

In Mint 18.1, TBB 6.5.1 was installed to /home/user/torbrowser/. Now
updated to 6.5.2 - still same issue.
I only have one TBB launcher (icon) - on the desktop (nowhere else) &
it uses the correct green TBB globe icon.
When TBB is running, the app icon on  Mint's panel is the orange /
blue Fx icon.  Any other TBB window I open (bookmarks, NoScript
options) - also use the orange Fx icon in the panel.


In the start-tor-browser.desktop file, it shows the icon
"mozicon128.png" - which should be correct .

Any idea why this icon switch happened?


Debian Jessie 32 bit. I have torbrowser's folder in my home/opt
directory and my panel icon is linked to
/home/opt/tor-browser_en-US/Browser/browser/icons. That's where the
standard panel icon is located. Note the first iteration of "Browser" in
the path IS capitalized.

G2s
Thanks, G.  Yep, that is apparently the path the TBB desktop file 
(start-tor-browser.desktop) points for the icon.

/tor-browser_en-US/Browser/browser/icons/mozicon128.png.
As said, it worked, then it didn't.

I just edited the desktop launcher &  re-selected the same icon (was 
already using - the one you mentioned).  For now it's displaying OK in 
the panel.
Looks like that icon file was changed in the update to 6.5.2.  Maybe the 
previous file got damaged, so Linux pulled the standard Fx icon from 
another place.   I'm not sure the orange Fx icon is included in the 
Linux TBB package.


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB users, please give 1 minute of your time for science

2017-04-25 Thread Mirimir
On 04/25/2017 04:26 PM, krishna e bera wrote:
> On 25/04/17 05:37 AM, c...@browserprint.info wrote:
>> I'm a PhD student.
>> I have no employer other than my university.
>> All my work is done with the intention of publishing it in academic
>> journals, conferences, my blog, and my thesis.
> 
> Going to the site we can see this project purports to be run by
> Lachlan Kang of University of Adelaide and funded by ACEMS.org.au
> with code available on https://github.com/qqTYXn7/browserprint
> MIT licence and website CC-by 4.0.
> Including all that info in the original call for our time might have
> reduced the number of raised hackles - or at least mine.
> 
> Now using iceweasel plus RequestPolicy-Continued add-on, clicking on the
> fingerprint me button i fill the captcha and see "Please wait..."
> followed by "An error has occurred."
> 
> My TBB results are like others reported here.

Just to be clear, I am not at all opposed to research that helps Tor.
Finding vulnerabilities is a key part of that. What annoyed me was op's
statement: "The aim of this is to detect and defeat browser spoofing."
As if spoofing is a bad thing, that ought to be defeated. An aim like
"identifying bugs in browser spoofing" would have been more diplomatic.

Also, it would perhaps have been more useful to first contact Tor
Project privately, after reading  and
.


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB users, please give 1 minute of your time for science

2017-04-25 Thread krishna e bera

On 25/04/17 05:37 AM, c...@browserprint.info wrote:

I'm a PhD student.
I have no employer other than my university.
All my work is done with the intention of publishing it in academic journals, 
conferences, my blog, and my thesis.


Going to the site we can see this project purports to be run by
Lachlan Kang of University of Adelaide and funded by ACEMS.org.au
with code available on https://github.com/qqTYXn7/browserprint
MIT licence and website CC-by 4.0.
Including all that info in the original call for our time might have 
reduced the number of raised hackles - or at least mine.


Now using iceweasel plus RequestPolicy-Continued add-on, clicking on the 
fingerprint me button i fill the captcha and see "Please wait..." 
followed by "An error has occurred."


My TBB results are like others reported here.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Fwd: TOR problems - seriously PLEASE HELP ME!

2017-04-25 Thread unpublished
Thank you for your help and specific answer!

I do not know yet how to put my reply (our correspondence question-answer) to 
everyone on the TOR blog (different from the standard forum)? I'm afraid that 
something of my actions it is a bad - doing something wrong.? I do not want to 
impose your politeness, but could you please explain it to me, or paste the 
content in the right place? 

I >A good idea would be to set the first/last COUNTRY (download/send data) of 
the final node - as many sites do not support connections from foreign 
countries.
>>As Jonathan mentioned in a reply to your post already, you are able to define 
>>a set of allowed exit countries (ie poland only) by following these 
>>instructions on wikihow: 
>>http://www.wikihow.com/Set-a-Specific-Country-in-a-Tor-Browser

Super, works as it should. This solves one already my problem! It is a pity 
that we country have so few nodes. Is it possible to add the number of 
intermediate nodes (it seems very dangerous when the end-country is my own) in 
two TOR settings to 4 or at least 3 ? (only available working "amazon" 
settings). 
I will try to run old 2 or 4 core PC, and share it as TOR 24h Poland node. 
(speeds IPv6 250/50Mbps be enough?) Maybe someone will help me to run this on 
free Linux (stable and maintenance-free working).

I >Can you somehow mask the fact that you use TOR browser, substituting the 
name of regular firefox?
>>The destination server (the website which says "don't support tor 
>>connections") probably doesn't block connections because of the browser you 
>>are using. Since every node in the tor network exposes its "tor-membership" 
>>to the network itself, it will always be possible to determine whether you 
>>are using tor or not. On this specific manner, a VPN connection may help you 
>>out, but please be aware that the provider of this VPN will then be able to 
>>log and maybe intercept your traffic.

I have a static IPv6 address they TOR work only with amazon settings (250Mbps 
TV cable network). Optionally I can uses the “open” non protected Wi-Fi network 
which blocks TOR connections also “amazon” and 2 bridges! (2.4Ghz only, and 
very slow max 50Mbps with 300Mbps - b,g,n, cards /8192 chip/, use beam aerial 
and 78% reach).

Nice to have you explained that this is not a browser issue just a "signature" 
node. Is there a way to change settings in the settings so that the recipient 
does not see that the TOR is being used?

I >There is still a question of what effect on the release of real IP, with use 
Kaspersky Internet Security 2017 (PC version), during because it Windows 
restart, injected its your packages (every couple of seconds it sends/receives 
packets on 443 port)
>>The most internet security solutions intercept ssl traffic to scan the 
>>contents of these connections for any Trojans or viruses. If not implemented 
>>with perfect care, these solutions probably more harm you than they help 
>>securing anything. You find an example of this here: 
>>http://www.securityweek.com/google-researcher-finds-certificate-flaws-kaspersky-products

Thank you, I read. Does anyone in TOR are really interested in Kaspersky LAB 
and whether (eg. Kaspersky Internet Security 2017 PC version) it not threatens 
to expose IP (un hidden) when using TOR worked at Windows 7,8,10???

Assuming that I use only secure pages, is not it safe to disable protection and 
then shut down KIS? I give up the protection of files and additionally I lose 
the useful option 1) effective "firewall" blocking telemetry and other spy 
sites (using svchost and raw RAW to retrieve information type whois, my 
location, markmonitor, etc.), 2) "Surfing Incognito" , 3) "Blocking banners". 
The question is worth it?


Once again great thanks for the help!

Regards

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB users, please give 1 minute of your time for science

2017-04-25 Thread cube


> Hi!
> 
> I've been making those tests on your website multiple times with the TBB but 
> most of the
> time I get a unique fingerprint even when re-doing the test at different 
> times with the same
> browser.
> 
> There also some wrong measurements such as the Facebook button that gets 
> labeled as
> being blocked by an Adblock list or similar when I didn't use any addon that 
> serves that
> purpose.
> 
> --Jeff
> -- 
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> %
> 
> 

Hi.
When you submit a fingerprint it sets a cookie in your browser that prevents 
double submission of identical fingeprints.
This could cause you to appear unique upon resubmission.

The ad-block thing is probably caused by one of Tor's advanced security 
features. It happens when the security slider is on high, but not low.

Thanks!
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Fwd: TOR problems - seriously PLEASE HELP ME!

2017-04-25 Thread Andre Mankel
>A good idea would be to set the first/last COUNTRY (download/send data) of
the final node - as many sites do not support connections from foreign
countries.
As Jonathan mentioned in a reply to your post already, you are able to
define a set of allowed exit countries (ie poland only) by following these
instructions on wikihow: http://www.wikihow.com/Set-a-
Specific-Country-in-a-Tor-Browser

>Can you somehow mask the fact that you use TOR browser, substituting the
name of regular firefox?
The destination server (the website which says "don't support tor
connections") probably doesn't block connections because of the browser you
are using. Since every node in the tor network exposes its "tor-membership"
to the network itself, it will always be possible to determine whether you
are using tor or not. On this specific manner, a VPN connection may help
you out, but please be aware that the provider of this VPN will then be
able to log and maybe intercept your traffic.

>There is still a question of what effect on the release of real IP, with
use Kaspersky Internet Security 2017 (PC version), during because it
Windows restart, injected its your packages (every couple of seconds it
sends/receives packets on 443 port)
The most internet security solutions intercept ssl traffic to scan the
contents of these connections for any Trojans or viruses. If not
implemented with perfect care, these solutions probably more harm you than
they help securing anything. You find an example of this here:
http://www.securityweek.com/google-researcher-finds-certificate-flaws-kaspersky-products


On Mon, Apr 24, 2017 at 8:29 PM, unpublished  wrote:

> Hello,
>
> I come from Poland (Now a country of totalitarian power - comparable to
> China, where the Constitution is not observed and explicitly does not
> respect the European Union's provisions and agreements - to which we
> belong).
>
> I'm very sorry for the duplication, but this was caused by my confusion in
> the structure of your operation (hard access, lack of possibility to set up
> your own topic thread). More than that, I can not find the answers to the
> questions I have asked, and I personally find them very important and
> crucial in terms of security.
> At current speeds of 120 / 250Mbps only two bridges - with the only active
> (works) "amazon" bridge option , it's probably a little too much!
> Another aspect of the usefulness of using TOR - web pages display a
> message that "DON'T SUPPORT TOR CONNECTIONS"). Can you somehow mask the
> fact that you use TOR browser, substituting the name of regular firefox?
> A good idea would be to set the first/last COUNTRY (download/send data) of
> the final node - as many sites do not support connections from foreign
> countries.
> There is still a question of what effect on the release of real IP, with
> use Kaspersky Internet Security 2017 (PC version), during because it
> Windows restart, injected its your packages (every couple of seconds it
> sends/receives packets on 443 port)
>
> Times and technologies have changed. The TOR idea was 100% effective 8-10
> years ago, now with surveillance for even AES256 or even PGP 8192 is not a
> guarantee of confidentiality. At home we have 8 core processors after 4Ghz
> and 256bit graphics on DDR5! Why not use this power of the face to protect
> our privacy!
>
> Best regards sincerely.
>
>
> PS. If you are interested in politics:
> People-nation is mesmerized and manipulated and deceived by state-owned
> public media controlled by "Current government - government, prime
> minister, president". The opposition is torn and divided, meaning nothing
> and no representation, struggling to keep up. People divided over the years
> into two factions, covered by total observation and ransacking in someone
> else's property and past, without respect for any privacy! This is a sad
> truth you will not hear on TV.
>
>
-- Forwarded message --
From: Jonathan Marquardt 
Date: Mon, Apr 24, 2017 at 6:30 AM
Subject: Re: [tor-talk] TOR problems - seriously PLEASE HELP ME!
To: tor-talk@lists.torproject.org
Cc: tor-oni...@lists.torproject.org, tor-rel...@lists.torproject.org,
global-so...@lists.torproject.org


On Mon, Apr 24, 2017 at 12:16:23PM +0200, unpublished wrote:
> 1. Many web pages display information that I do not support "TOR
> connections"?

Not sure, what you mean here. Perhaps THEY don't support (i.e. block)
connections from Tor users, because they are afraid of spam or other stupid
reasons. Nothing you can really do here. Websites blocking Tor is a huge
problem.

> 2. How to increase (amazon) the number of relay nodes?  Because standard
> only two redirect point?

There are always three nodes. The amazon node should be your guard relay
(where you enter the Tor network). Then there are two relays after that.
There
isn't really any way to change that. Three hops should be sufficient for
decent anonymity, no real need to worry here.

> 3. How to 

Re: [tor-talk] TBB users, please give 1 minute of your time for science

2017-04-25 Thread Anders Andersson
On 25 April 2017 at 13:12, Lolint  wrote:
> I've been making those tests on your website multiple times with the TBB but 
> most of the
> time I get a unique fingerprint even when re-doing the test at different 
> times with the same
> browser.

This is something worth pointing out. How does the current
browser-identification websites handle that?

If you always show up as "unique", even when returning, it means that
you are not really that unique or identifiable after all. This also
applies if you end up in small groups.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB users, please give 1 minute of your time for science

2017-04-25 Thread Lolint
Hi!

I've been making those tests on your website multiple times with the TBB but 
most of the
time I get a unique fingerprint even when re-doing the test at different times 
with the same
browser.

There also some wrong measurements such as the Facebook button that gets 
labeled as
being blocked by an Adblock list or similar when I didn't use any addon that 
serves that
purpose.

--Jeff
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB users, please give 1 minute of your time for science

2017-04-25 Thread cube
I'm a PhD student.
I have no employer other than my university.
All my work is done with the intention of publishing it in academic journals, 
conferences, my blog, and my thesis.

> David Olofsson:
> > There is always a risk of bugs and exploits in the code. Having a security
> > researcher study these gives us better knowledge of the current flaws and
> > how to correct them. If you truly trust the browsers current security this
> > should have no downside, otherwise it is the path to improving it.
> > 
> > //Sidju
> 
> It wasn't obvious to me whether OP intends to give their analysis to the
> Tor Browser devs (seems ethical) or instead keep it for proprietary
> purposes (seems unethical).
> 
> Can OP clarify on this point?
> 
> Cheers,
> -- 
> -Jeremy Rand
> Lead Application Engineer at Namecoin
> Mobile email: jeremyrandmob...@airmail.cc
> Mobile OpenPGP: 2158 0643 C13B B40F B0FD 5854 B007 A32D AB44 3D9C
> Send non-security-critical things to my Mobile with OpenPGP.
> Please don't send me unencrypted messages.
> My business email jer...@veclabs.net is having technical issues at the
> moment.
> -- 
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>   e
> 
> 
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB users, please give 1 minute of your time for science

2017-04-25 Thread Jeremy Rand
David Olofsson:
> There is always a risk of bugs and exploits in the code. Having a security
> researcher study these gives us better knowledge of the current flaws and
> how to correct them. If you truly trust the browsers current security this
> should have no downside, otherwise it is the path to improving it.
> 
> //Sidju

It wasn't obvious to me whether OP intends to give their analysis to the
Tor Browser devs (seems ethical) or instead keep it for proprietary
purposes (seems unethical).

Can OP clarify on this point?

Cheers,
-- 
-Jeremy Rand
Lead Application Engineer at Namecoin
Mobile email: jeremyrandmob...@airmail.cc
Mobile OpenPGP: 2158 0643 C13B B40F B0FD 5854 B007 A32D AB44 3D9C
Send non-security-critical things to my Mobile with OpenPGP.
Please don't send me unencrypted messages.
My business email jer...@veclabs.net is having technical issues at the
moment.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB users, please give 1 minute of your time for science

2017-04-25 Thread David Olofsson
There is always a risk of bugs and exploits in the code. Having a security
researcher study these gives us better knowledge of the current flaws and
how to correct them. If you truly trust the browsers current security this
should have no downside, otherwise it is the path to improving it.

//Sidju

On 25 Apr 2017 08:21, "grarpamp"  wrote:

> On Tue, Apr 25, 2017 at 2:15 AM, Mirimir  wrote:
> > On 04/24/2017 07:00 PM, c...@browserprint.info wrote:>>
> >> Could you please do me (and science) a favor and go to my site (
> >> https://browserprint.info ) using the Tor Browser Bundle and submit a
> >> fingerprint, making sure to fill in the optional questionnaire?
> >>
> >> At the moment I'm working on detecting a person's underlying
> >> operating system and browser family using their browser fingerprint.
> >> The aim of this is to detect and defeat browser spoofing. The number
> >> of Tor Browser Bundle users who have gone to my site and done this is
> >> extremely low, so I'm not able to properly train my detector to
> >> defeat the TBB, nor am I able to gauge how effective my detector is
> >> against the TBB.
> >>
> >> Rest assured that I will not use your data for anything malicious,
> >> nor will I attempt to deanonymise you in any way.
> >
> > Not malicious, you say? Browser spoofing is a key feature of Tor
> > browser. Defeating that sounds rather malicious.
>
> Were it to be defeated, the feature sounds pretty weak.
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB users, please give 1 minute of your time for science

2017-04-25 Thread grarpamp
On Tue, Apr 25, 2017 at 2:15 AM, Mirimir  wrote:
> On 04/24/2017 07:00 PM, c...@browserprint.info wrote:>>
>> Could you please do me (and science) a favor and go to my site (
>> https://browserprint.info ) using the Tor Browser Bundle and submit a
>> fingerprint, making sure to fill in the optional questionnaire?
>>
>> At the moment I'm working on detecting a person's underlying
>> operating system and browser family using their browser fingerprint.
>> The aim of this is to detect and defeat browser spoofing. The number
>> of Tor Browser Bundle users who have gone to my site and done this is
>> extremely low, so I'm not able to properly train my detector to
>> defeat the TBB, nor am I able to gauge how effective my detector is
>> against the TBB.
>>
>> Rest assured that I will not use your data for anything malicious,
>> nor will I attempt to deanonymise you in any way.
>
> Not malicious, you say? Browser spoofing is a key feature of Tor
> browser. Defeating that sounds rather malicious.

Were it to be defeated, the feature sounds pretty weak.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB users, please give 1 minute of your time for science

2017-04-25 Thread cube


> On 04/24/2017 07:00 PM, c...@browserprint.info wrote:
> > Hello, Tor community!
> > 
> > Could you please do me (and science) a favor and go to my site (
> > https://browserprint.info ) using the Tor Browser Bundle and submit a
> > fingerprint, making sure to fill in the optional questionnaire?
> > 
> > At the moment I'm working on detecting a person's underlying
> > operating system and browser family using their browser fingerprint. 
> > The aim of this is to detect and defeat browser spoofing. The number
> > of Tor Browser Bundle users who have gone to my site and done this is
> > extremely low, so I'm not able to properly train my detector to
> > defeat the TBB, nor am I able to gauge how effective my detector is
> > against the TBB.
> > 
> > Rest assured that I will not use your data for anything malicious,
> > nor will I attempt to deanonymise you in any way.
> > 
> > Thank you!
> 
> Not malicious, you say? Browser spoofing is a key feature of Tor
> browser. Defeating that sounds rather malicious.
> -- 
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>   e
> 
> 

You can't build defenses to attacks that nobody knows about.
And if I'm the one who develops the attack it'll be public knowledge; can't say 
the NSA would be so gracious.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Shodan & Hidden Services

2017-04-25 Thread grarpamp
> So it turns out that Shodan - a kind of multi-protocol Google-alike search
> engine for metadata and protocol headers - has indexed a bunch of Onion
> sites which were configured to leak their (onion) hostnames into protocol
> headers.
>
> https://www.shodan.io/search?query=.onion%2F
>
> This is... tragic, perhaps, and avoidable to varying extents (eg: my
> proposed setup process*) but the situation also possibly presents an
> opportunity for anyone who has identified addresses of sibyl/other naughty
> tor-infra-impacting activity, to maybe check some logs and see if any
> badly-configured onions were also hosted on the same addresses/subnets, get
> some concept of what hidden services were hosted there, and what they may
> have been up to?
>
> https://twitter.com/AlecMuffett/status/855542397165502464

If people think onionland is some errorproof perfect
configuration zone, free from scam, free from agents, free from
discovery, free from all manner of trickery, buggery, debuggery,
bauchery, exploit, or the bore of ever September, and so on
nope, it's been quite the opposite since day one.
That people are only recently studying finding and publishing
these things, claiming as news twatter to a hat, is rather amusing.
And of course such work is fine endeavour and report as well.
Have fun.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB users, please give 1 minute of your time for science

2017-04-25 Thread Mirimir
On 04/24/2017 07:00 PM, c...@browserprint.info wrote:
> Hello, Tor community!
> 
> Could you please do me (and science) a favor and go to my site (
> https://browserprint.info ) using the Tor Browser Bundle and submit a
> fingerprint, making sure to fill in the optional questionnaire?
> 
> At the moment I'm working on detecting a person's underlying
> operating system and browser family using their browser fingerprint. 
> The aim of this is to detect and defeat browser spoofing. The number
> of Tor Browser Bundle users who have gone to my site and done this is
> extremely low, so I'm not able to properly train my detector to
> defeat the TBB, nor am I able to gauge how effective my detector is
> against the TBB.
> 
> Rest assured that I will not use your data for anything malicious,
> nor will I attempt to deanonymise you in any way.
> 
> Thank you!

Not malicious, you say? Browser spoofing is a key feature of Tor
browser. Defeating that sounds rather malicious.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] TBB users, please give 1 minute of your time for science

2017-04-25 Thread cube
Hello, Tor community!

Could you please do me (and science) a favor and go to my site ( 
https://browserprint.info ) using the Tor Browser Bundle and submit a 
fingerprint, making sure to fill in the optional questionnaire?

At the moment I'm working on detecting a person's underlying operating system 
and browser family using their browser fingerprint.
The aim of this is to detect and defeat browser spoofing.
The number of Tor Browser Bundle users who have gone to my site and done this 
is extremely low, so I'm not able to properly train my detector to defeat the 
TBB, nor am I able to gauge how effective my detector is against the TBB.

Rest assured that I will not use your data for anything malicious, nor will I 
attempt to deanonymise you in any way.

Thank you!
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk