[tor-bugs] #13017 [Applications/Tor Browser]: Determine if AudioBuffers/OfflineAudioContext are a fingerprinting vector

Tor Bug Tracker & Wiki blackhole at torproject.org
Sun May 22 21:26:22 UTC 2016


#13017: Determine if AudioBuffers/OfflineAudioContext are a fingerprinting vector
---------------------------------------------+--------------------------
 Reporter:  mikeperry                        |          Owner:  tbb-team
     Type:  task                             |         Status:  new
 Priority:  Very High                        |      Milestone:
Component:  Applications/Tor Browser         |        Version:
 Severity:  Critical                         |     Resolution:
 Keywords:  tbb-fingerprinting-os, tbb-easy  |  Actual Points:
Parent ID:                                   |         Points:
 Reviewer:                                   |        Sponsor:
---------------------------------------------+--------------------------
Changes (by cypherpunks):

 * priority:  Medium => Very High
 * severity:  Normal => Critical


Comment:

 I have three different machines, one Windows and two Linux ones and I can
 verify that for each different machine using Tor Browser 5.5.5 the
 fingerprints are exactly the same for each machine.

 The fingerprinting persists on OS reboots, Tor Browser restarts and using
 Tor Browser's "New identity".

 I have tested using the website above
 (https://audiofingerprint.openwpm.com) in Tor Browser 5.5.5 using and have
 done the test three times for each machine.

 This is very problematic, hope this can be fixed soon! Thanks all!

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13017#comment:15>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list