[tor-dev] Browser extension identification/fingerprinting mitigation?

Griffin Boyce griffin at cryptolab.net
Sat Oct 26 18:14:35 UTC 2013


Hi all,

  I'm looking at possibly replacing the images used by Cupcake with
inline SVG XML, to reduce the possibility of fingerprinting/identifying
Cupcake users who use Chrome [1].  One of the more talked-about methods
of identifying a user's browser extensions is to look for images used by
the extension (in Chrome at least), so this seems to make some amount of
sense. [2]

Does anyone have any thoughts on this?

~Griffin

[1]
https://chrome.google.com/webstore/detail/cupcake/dajjbehmbnbppjkcnpdkaniapgdppdnc
[2] http://blog.kotowicz.net/2012/02/intro-to-chrome-addons-hacking.html

-- 
"Cypherpunks write code not flame wars." --Jurre van Bergen
#Foucault / PGP: 0xAE792C97 / OTR: saint at jabber.ccc.de

My posts are my own, not my employer's.



More information about the tor-dev mailing list