[tor-commits] [tor-browser-spec/master] Improve fingerprinting sources intro.

mikeperry at torproject.org mikeperry at torproject.org
Tue May 5 22:02:03 UTC 2015


commit f875020671b624b849d9280e761ad7588812f945
Author: Mike Perry <mikeperry-git at torproject.org>
Date:   Tue May 5 13:58:32 2015 -0700

    Improve fingerprinting sources intro.
---
 design-doc/design.xml |   18 +++++++++++++-----
 1 file changed, 13 insertions(+), 5 deletions(-)

diff --git a/design-doc/design.xml b/design-doc/design.xml
index 3a652be..cf0d959 100644
--- a/design-doc/design.xml
+++ b/design-doc/design.xml
@@ -1476,10 +1476,18 @@ severe, and how to study the efficacy of defenses properly.
     <title>Sources of Fingerprinting Issues</title>
     <para>
 
-All fingerprinting issues arise from one of four primary sources in the
-browser. Additionally, user behavior itself provides one more source of
-potential fingerprinting. Listed in order from most severe to least severe in
-terms of the amount of information they reveal, these sources are:
+All browser fingerprinting issues arise from one of four primary sources:
+end-user configuration details, device and hardware characteristics, operating
+system vendor and version differences, and browser vendor and version
+differences. Additionally, user behavior itself provides one more source of
+potential fingerprinting.
+
+    </para>
+    <para>
+
+In order to help prioritize and inform defenses, we now list these sources in
+order from most severe to least severe in terms of the amount of information
+they reveal, and describe them in more detail.
 
     </para>
     <orderedlist>
@@ -1574,7 +1582,7 @@ url="https://amiunique.org/">Am I Unique</ulink>.
    </orderedlist>
   </sect3>
   <sect3 id="fingerprinting-defenses">
-   <title>Fingerprinting defenses in the Tor Browser</title>
+   <title>Fingerprinting Defenses in the Tor Browser</title>
    <para>
 
 The following defenses are listed roughly in order of most severe



More information about the tor-commits mailing list