Torbutton Documentation - Adversary Capabilities.

Matthew pumpkin at cotse.net
Thu Jul 15 07:41:05 UTC 2010



On 15/07/10 08:21, Mike Perry wrote:
> Thus spake Matthew (pumpkin at cotse.net):
>
>>   So to go back to the OP's question (my question)....what do people think
>> of my questions about JavaScript being able to obtain non-Tor IPs when
>> wiping the cache?
> If you are also restarting the browser, or closing all windows, you
> are probably safe from most direct javascript attack vectors. The main
> danger is in leaving pages open after changing proxy settings. Then
> direct unmasking is possible. Identifiers can be stored in the page
> javascript itself.
>
Thanks for the information about fingerprinting.

Yes, I close the browser, wipe the cache, and all cookie, history, download 
files, then restart and remove the proxy settings.  I will start to use 
Torbutton however!

***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/



More information about the tor-talk mailing list