>>> My suggestion is to install >>> https://addons.mozilla.org/en-us/firefox/addon/smart-referer/ I >>> believe it doesn't break anything major (it has a whitelist feature >>> which is very short and includes disqus.com and github.com) and >>> just adds another protection against tracking. This would be an >>> easy and general solution for both hidden and clearnet websites. >> >> +1 for the quick and already-tested-elsewhere solution, if feasible. > > That's a cool add-on. > > I've used RefControl, by default forging referrers as root of sites > being visited. It doesn't break many sites. > > Which is riskier, sending no referrer, or forging as RefControl does? > > A quick search suggests that no referrer is worse than a forged one.
Yes, it's better to forge the referer, smart referer does that by default. ----- What do you people think about the idea to implement smart referer as default for hidden services, but integrate the option to use it for all websites (including clearnet) in the proposed security slider. https://trac.torproject.org/projects/tor/ticket/9623#comment:5 https://trac.torproject.org/projects/tor/ticket/9387#comment:15 -- tor-talk mailing list - [email protected] To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
