Torbutton Documentation - Adversary Capabilities.
Matthew
pumpkin at cotse.net
Thu Jul 15 07:41:05 UTC 2010
On 15/07/10 08:21, Mike Perry wrote:
> Thus spake Matthew (pumpkin at cotse.net):
>
>> So to go back to the OP's question (my question)....what do people think
>> of my questions about JavaScript being able to obtain non-Tor IPs when
>> wiping the cache?
> If you are also restarting the browser, or closing all windows, you
> are probably safe from most direct javascript attack vectors. The main
> danger is in leaving pages open after changing proxy settings. Then
> direct unmasking is possible. Identifiers can be stored in the page
> javascript itself.
>
Thanks for the information about fingerprinting.
Yes, I close the browser, wipe the cache, and all cookie, history, download
files, then restart and remove the proxy settings. I will start to use
Torbutton however!
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/
More information about the tor-talk
mailing list