commit f875020671b624b849d9280e761ad7588812f945 Author: Mike Perry mikeperry-git@torproject.org Date: Tue May 5 13:58:32 2015 -0700
Improve fingerprinting sources intro. --- design-doc/design.xml | 18 +++++++++++++----- 1 file changed, 13 insertions(+), 5 deletions(-)
diff --git a/design-doc/design.xml b/design-doc/design.xml index 3a652be..cf0d959 100644 --- a/design-doc/design.xml +++ b/design-doc/design.xml @@ -1476,10 +1476,18 @@ severe, and how to study the efficacy of defenses properly. <title>Sources of Fingerprinting Issues</title> <para>
-All fingerprinting issues arise from one of four primary sources in the -browser. Additionally, user behavior itself provides one more source of -potential fingerprinting. Listed in order from most severe to least severe in -terms of the amount of information they reveal, these sources are: +All browser fingerprinting issues arise from one of four primary sources: +end-user configuration details, device and hardware characteristics, operating +system vendor and version differences, and browser vendor and version +differences. Additionally, user behavior itself provides one more source of +potential fingerprinting. + + </para> + <para> + +In order to help prioritize and inform defenses, we now list these sources in +order from most severe to least severe in terms of the amount of information +they reveal, and describe them in more detail.
</para> <orderedlist> @@ -1574,7 +1582,7 @@ url="https://amiunique.org/%22%3EAm I Unique</ulink>. </orderedlist> </sect3> <sect3 id="fingerprinting-defenses"> - <title>Fingerprinting defenses in the Tor Browser</title> + <title>Fingerprinting Defenses in the Tor Browser</title> <para>
The following defenses are listed roughly in order of most severe
tor-commits@lists.torproject.org