browser fingerprinting - panopticlick
Mike Perry
mikeperry at fscked.org
Thu Jan 28 21:04:50 UTC 2010
Thus spake coderman (coderman at gmail.com):
> EFF has an interesting tool available:
> https://panopticlick.eff.org/
>
> technical details at
> https://www.eff.org/deeplinks/2010/01/primer-information-theory-and-privacy
>
> an interesting look at exactly how distinguishable your default
> browser configuration may be...
FYI, Torbutton has defended against many of these anonymity set
reduction attacks for years, despite how EFFs site may make it appear
otherwise.
https://www.torproject.org/torbutton/design/#requirements
https://www.torproject.org/torbutton/design/#attacks (#6)
But I'm glad the EFF is raising attention to this detail. I just wish
they also pointed people at http://whattheinternetknowsaboutyou.com/
to refresh their memories on that too.
After all, in normal operation, your history leaks one fuckload of a
lot of bits. And that's a technical term. Sensitive ones too, like
what diseases and genetic conditions you may have (via Google Health
url history, or Wikipedia url history). It's pretty annoying that the
browser makers really have no plan to do anything about that massive
privacy leak.
--
Mike Perry
Mad Computer Scientist
fscked.org evil labs
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20100128/bcc31a2d/attachment.pgp>
More information about the tor-talk
mailing list