[tor-bugs] #20214 [Applications/Tor Browser]: Ultrasound Cross Device Tracking techniques could be used to launch deanonymization attacks against some users

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Oct 17 13:15:02 UTC 2016


#20214: Ultrasound Cross Device Tracking techniques could be used to launch
deanonymization attacks against some users
--------------------------------------+--------------------------
 Reporter:  VasiliosMavroudis         |          Owner:  tbb-team
     Type:  defect                    |         Status:  new
 Priority:  Medium                    |      Milestone:
Component:  Applications/Tor Browser  |        Version:
 Severity:  Normal                    |     Resolution:
 Keywords:                            |  Actual Points:
Parent ID:                            |         Points:
 Reviewer:                            |        Sponsor:
--------------------------------------+--------------------------

Comment (by VasiliosMavroudis):

 Replying to [comment:3 bugzilla]:

 > At a first glance it looks like OP came here with a tinfoil hat,
 especially as most 44.1/48 kHz formats are not ultrasound capable. But, in
 general, there is some chance to become deanonymized during playback of
 watermarked media (e.g. from YouTube) in a range where compromised devices
 can record the differences in sound.
 >
 > > The prompt would only serve as an annoyance that the user would learn
 to ignore.
 > >
 > Warning as for maximization should be enough.

 You seem to imply that it's not possible to use ultrasounds to perform
 this attack. However, there are already a few companies using this
 technology, e.g., SilverPush, Lisnr.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20214#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list