Torbutton Documentation - Adversary Capabilities.
Kyle Williams
kyle.kwilliams at gmail.com
Mon Jul 12 20:10:23 UTC 2010
Beware of the Flash and other third-party plugins to your browser. Flash
can also store "flash cookies" on your system as well.
I would look at "about:plugins" and see what Firefox has loaded. Torbutton
does a good job at stopping third party plugins, but if you specifically
allow Flash and do not clear the cookie from Flash, you may have a problem.
Other than that, you have the right idea. :)
On Mon, Jul 12, 2010 at 8:45 AM, Matthew <pumpkin at cotse.net> wrote:
> Hello,
>
> I have been reading the Torbutton documentation (thanks, guys) and have a
> question about the adversary capabilities.
>
> The first adversary capability is "inserting javascript". The document
> says that "If not properly disabled, Javascript event handlers and timers
> can cause the browser to perform network activity after Tor has been
> disabled, thus allowing the adversary to correlate Tor and Non-Tor activity
> and reveal a user's non-Tor IP address."
>
> The third adversary capability is "inserting CSS". The document says that
> "CSS can also be used to correlate Tor and Non-Tor activity and reveal a
> user's Non-Tor IP address, via the usage of CSS popups - essentially
> CSS-based event handlers that fetch content via CSS's onmouseover attribute.
> If these popups are allowed to perform network activity in a different Tor
> state than they were loaded in, they can easily correlate Tor and Non-Tor
> activity and reveal a user's IP address."
>
> I understand that Torbutton is useful for protecting privacy in multiple
> ways. But I would like to address this specific issue if I may.
>
> Let us imagine that a user surfs the net using Tor (and Polipo or
> Privoxy). He has JavaScript installed and uses it for all sites. He
> finishes his activities and then closes his browser. He then wipes the
> following files and directories (I am using Ubuntu as my example):
>
> /.mozilla/firefox/nameofuser/cookies.sqlite
> /.mozilla/firefox/nameofuser/downloads.sqlite
> /.mozilla/firefox/nameofuser/cookies.sqlite-journal
> /.mozilla/firefox/nameofuser/places.sqlite
> /.mozilla/firefox/nameofuser/places.sqlite-journal
> /.mozilla/firefox/nameofuser/formhistory.sqlite
>
> /.mozilla/firefox/nameofuser/Cache/
>
> Now I assume that these Javascript events and handlers and the CSS handlers
> were downloaded into the Cache from when the user was browsing using Tor.
> They would then be deleted as detailed above. Therefore, when the user loads
> up Firefox and turns off the Tor proxy settings, presumably the potential
> for JavaScript or CSS to connect Tor and non-Tor activity and get the users
> real (non-Tor) IP address is no longer a concern?
>
> Is this correct? Or am I missing something? Just to re-state: I am only
> looking at this one issue - I am well aware of how useful Tor button is in
> other areas!
>
> Thanks.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20100712/1043b554/attachment.htm>
More information about the tor-talk
mailing list