D
Deleted member 9563
Guest
I do know, that those who are talking here about fingerprinting like "So what? I do not care" probably won't study it. And even more probably they won't stop talking like they did before.
looks like
I do know, that those who are talking here about fingerprinting like "So what? I do not care" probably won't study it. And even more probably they won't stop talking like they did before.
Which leads me back to one of my original points. Everyone is tracking you as much as they can and have been doing so since time immemorial. Again. It's marketing. No one cares about you. It's not personal. You're just a number and a sales objective. It's just that nowadays people immediately think Macy's is selling your DNA to the NSA. It makes great headlines cause it sells newspapers.I personally would not feel more comfortable clicking unprotected on sites like Amazon, because they are tracking visitors.
Which leads me back to one of my original points. Everyone is tracking you as much as they can and have been doing so since time immemorial. Again. It's marketing.
No one cares about you. It's not personal. You're just a number and a sales objective. It's just that nowadays people immediately think Macy's is selling your DNA to the NSA. It makes great headlines cause it sells newspapers.
Those using Tor might be interested in the following, as fingerprinting is a method attacking anonymity:
http://jcarlosnorte.com/security/2016/03/06/advanced-tor-browser-fingerprinting.html
It is easy to fingerprint users using tor browser to track their activity online and correlate their visits to different pages.
Well, it depends on what the "fingerprint" is, doesn't it? If the site (or adsystem on the site) is able to get an accurate fingerprint from just the browser you are using, the don't need to worry if you are connecting through TOR or not.It is one thing to fingerprint a user when you know the user and have control of where they're connecting, but it is quite another to make a correlation within the Tor framework. One would have to first identify the user on a non-Tor site and then while she's logged in there, correlate that fingerprint with the "hidden" service connection. And the person being attacked would have to have javascript turned on (which they most certainly wouldn't do if they were paranoid), and both sites would have to be owned or under control of the same entity. As you see, it's getting pretty far fetched.
Well, it depends on what the "fingerprint" is, doesn't it? If the site (or adsystem on the site) is able to get an accurate fingerprint from just the browser you are using, the don't need to worry if you are connecting through TOR or not.
To prevent the likelyhood of this happening you should always use a different browser (than your "normal" one) when you are using TOR.
What do you mean that no one cares about me? I do!
I dislike being a 1 in 4.4 million fingerprint when I'm on the Internet.
Ok, just turn it around then; your "normal" browser should be a different browser than the one you use with TOR (and it probably is). You get the idea.The browser fingerprint is the save from all Tor Browsers, with the exception that if you're using an older version (which is bad) you will have an earlier print. I can confirm this from looking at logs on my onion servers.
It's a very bad idea to use another browser with tor. If you read Tor FAQs you will see that it is in fact strongly advised not to. Always use the Tor Browser. It works very well so there's really no reason not to anyway.
Ok, just turn it around then; your "normal" browser should be a different browser than the one you use with TOR (and it probably is). You get the idea.
I went to their site a few hours ago and got a difference format that said I was something like 257,000 and 12.7 . I just did it again about ten minutes ago and the format was difference and with these exact rating. I think they may be modifying the algorithm as we speak. I wonder have they found something interesting since this thread, or receiving more hits and conversations about them elsewhere since this thread [un_x, Jul 24, 2014] done came back up just a little over a month ago.Perhaps it would help to get back to the original poster's question, relating to the technical detail applicable to fingerprint reduction.
From the OP:
On that note I checked panopticlick.eff.org yesterday, and it seemed to be reset to only 100,000 total samples. Did they change their algorithm enough to warrant a reset? Is anyone else here seeing the same (low) number?
panopticlick.eff.org
Within our dataset of several hundred thousand visitors, only one in 68668.5 browsers have the same fingerprint as yours.
Currently, we estimate that your browser has a fingerprint that conveys 16.07 bits of identifying information.
Just to add some confusion
1. With FreeBSD there is no port "Tor Browser". Did you compile the "Tor Browser" from original sources successfully?
2. There is a port security/tor that allows any browser and more to be used with tor. And this is mainly done with FreeBSD while lacking other opportunities except some browser plugins that I do not like.
3. It makes a lot of sense using Tor Browser regarding fingerprinting (and other reasons) when using Tor, because it is a cloned fingerprint.
4. To me it does not make much sense using the fingerprint of Tor Browser while not using Tor because it hints to a user also using Tor which should be avoided IMO.
I went to their site a few hours ago and got a difference format that said I was something like 257,000 and 12.7 . I just did it again about ten minutes ago and the format was difference and with these exact rating. I think they may be modifying the algorithm as we speak. I wonder have they found something interesting since this thread, or receiving more hits and conversations about them elsewhere since this thread [un_x, Jul 24, 2014] done came back up just a little over a month ago.
...
I'm not concerned that the boogey man is out to get me so I spend my time on more productive things.But what about you? Do you like it to be tracked?
I wonder how many of you guys are aware that, when you use your cellphone, there's a record of tracking your movement around town.
I wonder how many of you guys are aware that, when you use your cellphone, there's a record of tracking your movement around town.