[tor-talk] Spoofing a browser profile to prevent fingerprinting
Öyvind Saether
oyvinds at everdot.org
Fri Aug 1 01:44:08 UTC 2014
> The simplest way would be to add a VE service on a TOR relay
> publishing a browser. You would not only be asking TOR relay
> providers to donate some bandwidth but also some processing power.
So I run the relay with a VE and now I get to see what everyone using
that VE is doing? I am not sure this is a good idea.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 181 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20140801/28c154cd/attachment.sig>
More information about the tor-talk
mailing list