[tor-bugs] #11949 [Firefox Patch Issues]: Randomize Tor Browser Fingerprint
Tor Bug Tracker & Wiki
blackhole at torproject.org
Wed May 14 10:20:28 UTC 2014
#11949: Randomize Tor Browser Fingerprint
--------------------------------------+-----------------------
Reporter: mt2014 | Owner: mikeperry
Type: enhancement | Status: new
Priority: normal | Milestone:
Component: Firefox Patch Issues | Version:
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
--------------------------------------+-----------------------
Comment (by mt2014):
For Single/Static fingerprint to work the userbase must be very very
large. If not big company/government will just block access to that one
fingerprint. Not hurting their income, its just very very very tiny
market.
If you randomize your fingerprint with other big 4 browsers (with default
setting), Big company cant just block you, if they do, they will also
block very large userbase. which unlikely they will choose that route.
When speaking Anonymity static fingerprint will never gonna provide true
Anonymity. Because every big company/government know how to block
TorBrowser & Jondofox if they want.
Here's some prove:
-) all chinese user cant access anything when using jondofox and
torbrowser, because its easily recognized and blocked by government.
-) user cant login/signup to getpocket.com using every single "true"
privacy browser like dooble, torbrowser, jondofox)
-) you cant signup google adwords account using torbrowser, your account
will be banned in no time.
true anonymity is "everything randomize" which means they dont know what
browser you are using, or any info about you, because it keeps changing.
you are like a ghost, they cant recognize/block you.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11949#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list