[tor-talk] Spoofing a browser profile to prevent fingerprinting
Mirimir
mirimir at riseup.net
Tue Jul 29 16:40:13 UTC 2014
On 07/29/2014 10:09 AM, OpenPGP wrote:
> Hi all,
>
> has anybody tried the solution mentioned in http://www.ianonym.com ?
> I'm just reading all the stuff and information but feel a bit lost :p how to
> set it al and use it ;)
My word, that is complicated!
But even so, if only a few use it with Tor, they probably stand out.
More generally, the greater the diversity of anonymization options, the
less anonymity there is :(
>> Aymeric Vittesal:
>> ...
>> Or unless you use something like http://www.ianonym.com, it was designed
>> to defeat all forms of tracking/fingerprinting with the fake domain
>> concept and hide your destination even with https.
>>
>> Since it takes control over the whole web page, the js interactions are
>> sandboxed with a script to "tame" the page, a prototype was working but
>> maybe it's a bit too complicate...
>>
>> Regards
>
> ✡
>
>
> ______________________________
> http://www.openpgp.org
> https://www.gnupg.org
> ______________________________________________________________
>
>
>
More information about the tor-talk
mailing list