[tor-dev] Browser extension identification/fingerprinting mitigation?
Griffin Boyce
griffin at cryptolab.net
Sat Oct 26 18:14:35 UTC 2013
Hi all,
I'm looking at possibly replacing the images used by Cupcake with
inline SVG XML, to reduce the possibility of fingerprinting/identifying
Cupcake users who use Chrome [1]. One of the more talked-about methods
of identifying a user's browser extensions is to look for images used by
the extension (in Chrome at least), so this seems to make some amount of
sense. [2]
Does anyone have any thoughts on this?
~Griffin
[1]
https://chrome.google.com/webstore/detail/cupcake/dajjbehmbnbppjkcnpdkaniapgdppdnc
[2] http://blog.kotowicz.net/2012/02/intro-to-chrome-addons-hacking.html
--
"Cypherpunks write code not flame wars." --Jurre van Bergen
#Foucault / PGP: 0xAE792C97 / OTR: saint at jabber.ccc.de
My posts are my own, not my employer's.
More information about the tor-dev
mailing list