[tor-commits] [tor-browser-spec/master] Improve fingerprinting sources intro.
mikeperry at torproject.org
mikeperry at torproject.org
Tue May 5 22:02:03 UTC 2015
commit f875020671b624b849d9280e761ad7588812f945
Author: Mike Perry <mikeperry-git at torproject.org>
Date: Tue May 5 13:58:32 2015 -0700
Improve fingerprinting sources intro.
---
design-doc/design.xml | 18 +++++++++++++-----
1 file changed, 13 insertions(+), 5 deletions(-)
diff --git a/design-doc/design.xml b/design-doc/design.xml
index 3a652be..cf0d959 100644
--- a/design-doc/design.xml
+++ b/design-doc/design.xml
@@ -1476,10 +1476,18 @@ severe, and how to study the efficacy of defenses properly.
<title>Sources of Fingerprinting Issues</title>
<para>
-All fingerprinting issues arise from one of four primary sources in the
-browser. Additionally, user behavior itself provides one more source of
-potential fingerprinting. Listed in order from most severe to least severe in
-terms of the amount of information they reveal, these sources are:
+All browser fingerprinting issues arise from one of four primary sources:
+end-user configuration details, device and hardware characteristics, operating
+system vendor and version differences, and browser vendor and version
+differences. Additionally, user behavior itself provides one more source of
+potential fingerprinting.
+
+ </para>
+ <para>
+
+In order to help prioritize and inform defenses, we now list these sources in
+order from most severe to least severe in terms of the amount of information
+they reveal, and describe them in more detail.
</para>
<orderedlist>
@@ -1574,7 +1582,7 @@ url="https://amiunique.org/">Am I Unique</ulink>.
</orderedlist>
</sect3>
<sect3 id="fingerprinting-defenses">
- <title>Fingerprinting defenses in the Tor Browser</title>
+ <title>Fingerprinting Defenses in the Tor Browser</title>
<para>
The following defenses are listed roughly in order of most severe
More information about the tor-commits
mailing list