[tor-dev] Browser extension identification/fingerprinting mitigation?
griffin at cryptolab.net
Sat Oct 26 18:14:35 UTC 2013
I'm looking at possibly replacing the images used by Cupcake with
inline SVG XML, to reduce the possibility of fingerprinting/identifying
Cupcake users who use Chrome . One of the more talked-about methods
of identifying a user's browser extensions is to look for images used by
the extension (in Chrome at least), so this seems to make some amount of
Does anyone have any thoughts on this?
"Cypherpunks write code not flame wars." --Jurre van Bergen
#Foucault / PGP: 0xAE792C97 / OTR: saint at jabber.ccc.de
My posts are my own, not my employer's.
More information about the tor-dev