#31512: Fingerprinting of Tor Browser --------------------------------------+-------------------------- Reporter: thelamper | Owner: tbb-team Type: enhancement | Status: closed Priority: Medium | Milestone: Component: Applications/Tor Browser | Version: Severity: Major | Resolution: invalid Keywords: | Actual Points: Parent ID: | Points: Reviewer: | Sponsor: --------------------------------------+--------------------------
Comment (by thelamper): Both of those fingerprinting tests (brax.me/geo/) and (tor.triop.se/) fail with javascript disabled ie they cannot generate a 'unique identifying number'. Does having javascript disabled make it harder to fingerprint individual Tor users ie it reduces the data leaked by the user's browser to the website in question? The panopticlick and amiunique tests suggest that disabling JS helps users blend in with the crowd by reducing their uniqueness. Or is it generally viewed by the Tor Project as safe (ie non- fingerprintable) for Tor users to browse the web with javascript enabled? -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31512#comment:8> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs