[tbb-bugs] #20214 [Applications/Tor Browser]: Ultrasound Cross Device Tracking techniques could be used to launch deanonymization attacks against some users
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Oct 17 13:15:02 UTC 2016
#20214: Ultrasound Cross Device Tracking techniques could be used to launch
deanonymization attacks against some users
--------------------------------------+--------------------------
Reporter: VasiliosMavroudis | Owner: tbb-team
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+--------------------------
Comment (by VasiliosMavroudis):
Replying to [comment:3 bugzilla]:
> At a first glance it looks like OP came here with a tinfoil hat,
especially as most 44.1/48 kHz formats are not ultrasound capable. But, in
general, there is some chance to become deanonymized during playback of
watermarked media (e.g. from YouTube) in a range where compromised devices
can record the differences in sound.
>
> > The prompt would only serve as an annoyance that the user would learn
to ignore.
> >
> Warning as for maximization should be enough.
You seem to imply that it's not possible to use ultrasounds to perform
this attack. However, there are already a few companies using this
technology, e.g., SilverPush, Lisnr.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20214#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tbb-bugs
mailing list