browser fingerprinting - panopticlick

Andrew Lewman andrew at torproject.org
Sat Jan 30 05:10:41 UTC 2010


On 01/29/2010 08:20 PM, 7v5w7go9ub0o wrote:
 > As we slowly transition to web 2.0, probably the next step is putting
> the TOR browser in a VM full of bogus, randomized userid/sysid/network
> information - carefully firewalled to allow TOR access only (TOR would
> be running somewhere outside the browser VM).

Already working on that, https://www.torproject.org/torvm/ or pick a
live cd with tor integrated into it.

-- 
Andrew Lewman
The Tor Project
pgp 0x31B0974B


Website: https://torproject.org/
Blog: https://blog.torproject.org/
Identi.ca: torproject
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/



More information about the tor-talk mailing list