[tor-talk] Spoofing a browser profile to prevent fingerprinting
OpenPGP
openpgp at openmailbox.org
Tue Jul 29 17:19:41 UTC 2014
But I like the idea of fake domain(s) :)
Wouldn't it be possible to implement by any way with TBB (as a part how-to in
TBB web/blog ? ;)
Btw, am I right to suppose that for not to be fingerprintined when I am
sometimes on some sites asked to allow the canvas, simply not allow to ?
Thanks.
> Mirimir:
> On 07/29/2014 10:09 AM, OpenPGP wrote:
> > Hi all,
> >
> > has anybody tried the solution mentioned in http://www.ianonym.com ?
> > I'm just reading all the stuff and information but feel a bit lost :p how
> > to set it al and use it ;)
>
> My word, that is complicated!
>
> But even so, if only a few use it with Tor, they probably stand out.
> More generally, the greater the diversity of anonymization options, the
> less anonymity there is :(
>
> >> Aymeric Vittesal:
> >> ...
> >> Or unless you use something like http://www.ianonym.com, it was designed
> >> to defeat all forms of tracking/fingerprinting with the fake domain
> >> concept and hide your destination even with https.
> >>
> >> Since it takes control over the whole web page, the js interactions are
> >> sandboxed with a script to "tame" the page, a prototype was working but
> >> maybe it's a bit too complicate...
> >>
> >> Regards
✡
______________________________
http://www.openpgp.org
https://www.gnupg.org
__________________________________________________________________________________
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 213 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20140729/ec8153de/attachment.sig>
More information about the tor-talk
mailing list