Hi, On Mon, Jun 6, 2016 at 2:47 PM, <[email protected]> wrote:
> Hello, I'm the creator of a new fingerprinting website, > https://browserprint.info > Think Panopticlick but with a lot more tests. > Many of the tests are even designed specifically to catch the Tor browser > bundle out, for instance the Math/Tan function returns a different value > based on what your underlying operating system is, so it's easy to detect > when a browser is lying in their user-agent string. > This is clever! I didn't know about this. I see that 64bit Linux machine it produces the value -1.4214488238747245 and on windows -4.987183803371025. TorBrowser should not let you to detect the operation system. > I would greatly appreciate if you visit the site and fingerprint > yourselves since it will help me refine the techniques and improve the site. > We will visit your site. Interesting work. > I'm adding more tests every week and if you have any ideas or suggestions > I'd love to hear them. Thanks! Best, Juha -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
