[tor-talk] Spoofing a browser profile to prevent fingerprinting
OpenPGP
openpgp at openmailbox.org
Tue Jul 29 16:09:29 UTC 2014
Hi all,
has anybody tried the solution mentioned in http://www.ianonym.com ?
I'm just reading all the stuff and information but feel a bit lost :p how to
set it al and use it ;)
> Aymeric Vittesal:
> ...
> Or unless you use something like http://www.ianonym.com, it was designed
> to defeat all forms of tracking/fingerprinting with the fake domain
> concept and hide your destination even with https.
>
> Since it takes control over the whole web page, the js interactions are
> sandboxed with a script to "tame" the page, a prototype was working but
> maybe it's a bit too complicate...
>
> Regards
✡
______________________________
http://www.openpgp.org
https://www.gnupg.org
______________________________________________________________
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 213 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20140729/00fa2cc7/attachment.sig>
More information about the tor-talk
mailing list