Unless a site exploits a security flaw in firefox to generate cookies based on hardware, or has a nasty Java applet or activex script, then cookies can't be used to track you if you clear them often.<br><br>
<div><span class="gmail_quote">On 4/16/06, <b class="gmail_sendername">Arrakistor</b> <<a href="mailto:arrakistor@gmail.com">arrakistor@gmail.com</a>> wrote:</span>
<blockquote class="gmail_quote" style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">Hello Mike,<br><br>Regarding the cookies, in that perspective, I do not know. If cookies<br>can be generated by unique hardware, and be reliably regenerated by
<br>the same algorithm, and cookies actually having access to anything<br>that could make such data, I really do not know. But assuming all the<br>prior was possible, then yes, cookies could probably distinguish your
<br>hardware as a unique identifier.<br><br>Torpark 1.5.0.2b available in a few hours. Blows away all previous<br>versions.<br><br>ST<br><br><br><br>Monday, April 17, 2006, 9:35:16 AM, you wrote:<br><br>> Thanks for your answer, and I always do a complete "Clear Private Data"
<br>> in Firefox or Torpark before closing and switch to the other. Then no<br>> cookies left over to the next. BTW, the question was more of a possible<br>> collecting of identical data by both cookie-sessions.<br>
<br>> Torpark is inside a own folder on my drive, the regular Firefox is in<br>> itīs standard default installation folder.<br><br><br><br>> On Thu, 6 Apr 2006 01:09:03 -0500, "Mike Perry" <<a href="mailto:mikepery@fscked.org">
mikepery@fscked.org</a>><br>> said:<br>>> Thus spake Total Privacy (<a href="mailto:nosnoops@fastmail.fm">nosnoops@fastmail.fm</a>):<br>>><br>>> > Two hypothetical examples:<br>>> ><br>
>> > 1.<br>>> > I?m using the normal Firefox (without Tor) with cookies enabled<br>>> > to log in on Yahoo email to make some stuff as my real identity.<br>>> > Then I close the normal Firefox and start Torpark Firefox with
<br>>> > cookies enabled to log in on another Yahoo email to make some<br>>> > stuff as an fake identity. Now the question is, are the cookies<br>>> > capable to retrieve some unique information about my computer,
<br>>> > that later is comparable at Yahoo head quarter, to figure out<br>>> > this two different Yahoo webmail accounts was actually runned<br>>> > from one same computer?<br>>><br>>> That depends on your profile directory.. If torpark and firefox are
<br>>> sharing the same profile, cookies will be shared. If they are sharing<br>>> profiles, extensions probably will be shared also.<br>>><br>>> An easy to check this without devling through arcane browser settings
<br>>> is to install a cookie monitoring extension. I really like Add N' Edit<br>>> cookies myself. You can search for yahoo via each browser and make<br>>> sure no cookies are cross-populating.<br>>>
<br>>> > 2.<br>>> > The same base as in the example 1 above, but with the difference<br>>> > that no cookies enabled anywhere and the webmail account is at<br>>> > Fastmail with complete https connection for everything. Now the
<br>>> > question is, are there some unique properties by my computer?s<br>>> > https handling that appear the same on the Fastmail head quarter<br>>> > to make sure the two webmail accounts was runned from the one
<br>>> > same computer?<br>>><br>>> I think that unless you have installed a client certificate, there<br>>> should be no identifying information in an SSL handshake. If you do<br>>> have a client certificate installed (you will know if you do), I think
<br>>> the client only uses it if the server requests it.<br>>><br>>> --<br>>> Mike Perry<br>>> Mad Computer Scientist<br>>> <a href="http://fscked.org">fscked.org</a> evil labs<br><br>
<br><br><br>--<br>Best regards,<br>Arrakistor mailto:<a href="mailto:arrakistor@gmail.com">arrakistor@gmail.com</a><br><br></blockquote></div><br>