[tor-bugs] #31512 [Applications/Tor Browser]: Fingerprinting of Tor Browser

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Sep 18 04:33:55 UTC 2019


#31512: Fingerprinting of Tor Browser
--------------------------------------+--------------------------
 Reporter:  thelamper                 |          Owner:  tbb-team
     Type:  enhancement               |         Status:  closed
 Priority:  Medium                    |      Milestone:
Component:  Applications/Tor Browser  |        Version:
 Severity:  Major                     |     Resolution:  invalid
 Keywords:                            |  Actual Points:
Parent ID:                            |         Points:
 Reviewer:                            |        Sponsor:
--------------------------------------+--------------------------

Comment (by Thorin):

 Replying to [comment:8 thelamper]:
 > Does having javascript disabled make it harder to fingerprint individual
 Tor users

 Absolutely. Reducing the attack surface (by disabling JS) removes a
 **lot** of the FPing metrics possible.

 > Or is it generally viewed by the Tor Project as safe (ie non-
 fingerprintable) for Tor users to browse the web with javascript enabled?

 My view is that it's always a work in progress but the anti-FPing in Tor
 Browser is very mature at this stage. Instead, adapt to your threat model,
 and use the security slider.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31512#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list