> So it’s not collecting sound played or recorded on a machine but rather 
> harvesting the audio signature of the individual machine and using that as an 
> identifier to track a web user.
"Audio signature" seems a bit broad.  From what I can tell it could be doing 
about three things:1) Fingerprint the browser by looking at the antialiasing 
method its 
audiocontext implementation uses2) If the browser is branching the antialiasing 
method based on the 
machine/processor/etc., then the miner can infer that by looking at the 
output.3) Measuring the time it takes the machine to generate the output.
It's a javascript api, and if you have javascript turned on there are already 
way easier ways to get #1 and #2.  Plus I doubt #3 would ever be the 
determining factor in positively ID'ing a machine.
But it's still another bit of data.  When GCC adds a line to output a caret 
showing the exact column where an error starts, I go, "Oh, that's very nice!" 
I'm sure the folks at the other end of your request do the same.
-Jonathan
 
 
    

 On Friday, June 3, 2016 5:40 PM, "[email protected]" <[email protected]> 
wrote:
 

 Actually meant if some of you anon folks knew if it was possible to
perform this deanonymisation without javascript. The "fuck javascript"
part that i know :)

juan:
> On Thu, 26 May 2016 06:23:34 +0000
> "[email protected]" <[email protected]> wrote:
>
>
>> uses fingerprintjs2 library.
>>
>> Any thoughts?
>     fuck javascript?
>
>


-- 
tor-talk mailing list - [email protected]
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


  
-- 
tor-talk mailing list - [email protected]
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to