[tor-talk] Users profiling through personаl banners filtering settings
zzretro999 at email2me.net
zzretro999 at email2me.net
Fri Apr 29 12:13:22 UTC 2011
From: Kraktus <kraktus at googlemail.com>
To: tor-talk at lists.torproject.org
Sent: Mon, Apr 25, 2011 8:26 pm
Subject: Re: [tor-talk] Users profiling through personаl banners filtering settings
Well, you could make this argument for any blocking activity: cookies,
of things, then they stand out because they are blocking things, and
most people aren't. You might even be able to do extensive tests to
find out what sorts of things they are blocking and find some sort of
Take cookies for example. Imagine these scenarios:
1. User blocks all cookies.
2. User blocks all cookies except cookies from whitelisted sites.
3. User accepts all cookies except cookies from blacklisted sites.
4. User accepts all cookies.
Now, as I understand it, your argument is that any deviation from 4,
but especially selective whitelisting/blacklisting as described in 2
and 3, is a variation from the norm and hence makes a user stand out.
(I believe, it would actually either require multiple sites to
collaborate to perform such an attack, or else, as you suggested, the
exit node itself might perform the attack.)
Now, while there are some cookies that do not contain anything unique,
most cookies are used to store unique IDs. So if you accept a cookie
from a site, they are probably going to give you a unique pseudonym
they can use to track you with. On the other hand, if you refuse to
accept cookies from that site, then you are part of the anonymity
group of Tor users who do not accept cookies from that site. Yes, they
could use other techniques to narrow things down, but at least you
haven't let them give you a unique session ID. So, I think the closer
you can get to 1, without sacrificing too much usability, the better.
The more Tor users can be persuaded to do 2, the better. The more Tor
users could at least be persuaded, if not to do that, then to at least
have a blacklist of advertising domains (3), the better. Then you will
stand out less when you refuse to accept a cookie. (In Firefox, you
can use the Cookie Monster plugin to help with this.)
vulnerabilities, so an attacker might exploit a buffer overflow or
something, and use that to reveal your identity. Even if the
about you. For an idea of what I am talking about, take a look at this
(That will also show you why you shouldn't allow plugins such as Java
or Flash when using Tor unless you have a fancy setup to force them
through Tor, or simply don't care about your anonymity that much, and
even then, they can still reveal a lot.)
specific information about my computer than simply "This user does not
you block, the better. The more Tor users can be persuaded to only
outweigh the anonymity concerns). the better. The more Tor users can
be persuaded, if not to do that, then at least to specify websites
NoScript can help with this.
Here's a good noscript.untrusted, if you prefer the blacklist method
or just want to minimize the chance of accidentally allowing
ad.linkstorms.com adbrite.com adbureau.net addthis.com addynamix.com
adgardener.com ads.alphatrade.com ads.forbes.com ads.pointroll.com
ads.reason.com ads.space.com ads1.msn.com adsonar.com adtech.de
adtology3.com advertising.com adzones.com afy11.net blogads.com
doubleclick.com doubleclick.net facebook.net falkag.net getclicky.com
google-analytics.com googleadservices.com googlesyndication.com
hitbox.com quantserve.com scorecardresearch.com serving-sys.com
specificclick.net statcounter.com tacoda.net zedo.com
http://adbrite.com http://adbureau.net http://addthis.com
http://addynamix.com http://adgardener.com http://adsonar.com
http://adtech.de http://adtology3.com http://advertising.com
http://adzones.com http://afy11.net http://blogads.com
http://doubleclick.net http://facebook.net http://getclicky.com
http://googlesyndication.com http://hitbox.com http://quantserve.com
http://specificclick.net http://statcounter.com http://tacoda.net
http://zedo.com https://adbrite.com https://adbureau.net
https://addthis.com https://addynamix.com https://adgardener.com
https://adsonar.com https://adtech.de https://adtology3.com
https://advertising.com https://adzones.com https://afy11.net
https://blogads.com https://doubleclick.net https://facebook.net
https://specificclick.net https://statcounter.com https://tacoda.net
I feel the same way about adblocking. The fewer web logs I show up in,
the better. I don't see any reason why I should show up in the log of
website that is pretty much exclusively advertising. When I visit a
website, I only want to show up in the log for that website, not a
bunch of third party websites. Unfortunately, some websites don't work
without third-party content, so I guess unless I don't care about
usability, I have to make some compromises. Still, I have found
adblockplus very useful for blocking third party content without much
of a usability hit. EasyList and EasyPrivacy are very helpful. The
localizations are good if you visit a lot of non-English websites.
Antisocial is good for stopping tracking by social networking
websites. Malware Domains is probably a good idea for Windows users
who don't like to use anti-virus, or who only like to use it
on-demand. (That is, none of that active protection stuff.) Certain
other lists are good if you are visiting certain types of websites.
You know, there have been cases of people getting viruses from
reputable websites when an infected advertisment somehow made it in to
whatever advertiser they were using.
In short, I think the privacy benefits of blocking unwanted
being profiled based on your pattern of blocking stuff, and if you are
concerned about being profiled based on your pattern of blocking
stuff, then the solution is to get more Tor users to block more of
that sort of thing.
On 10/04/2011, unknown <unknown at pgpru.com> wrote:
> On Tue, 22 Mar 2011 18:26:34 +0000
> unknown <unknown at pgpru.com> wrote:
>> Too many users dislikes of annoying web elements -- banners, popups,
>> strange frames. They use a tools to blocks that elements or change webpage
>> Traditional programs for filtering is a local proxys -- privoxy or polipo
>> are examples with
>> close relation to Tor and used actively. This programs cannot filtering
>> SSL-content and evil site
>> can use mix of SSL-ed and non-SSL-ed banners, pop-ups, etc to determine a
>> of using such proxy and trying to guess personal users filtering settings.
>> The problem may be even worse, with or without using this proxy, even if
>> users block
>> contents within a browser itself (with Firefox plugins to block banners,
>> and scripts). Not
>> only sites, but "mans in the middles", adversarial clusters of evil exit
>> can does parsing traffic and modifying web contents by injecting banners,
>> cookies, incorrect frames.
>> Injected traffic for various sites, in different times
>> and seances can be the way of revealing users with personal blocking
>> rules. Data
>> about blocking profiles of that users may be statistical processed and
>> Is it a real threat? Should Tor users stop blocking contents
>> selectively? Or they can use predefined and shared rules in analogy of
> Let me describe a two examples about users blocks banners in
> 1. Webhost can see that user block russian/german/chinese/etc big portal
> banners. Webservers owner can make a conjecture about specific language of
> the user.
> 2. One exit or colluding exit nodes can compare banners blocking profiles
> from time to time. Profiles can be linked from different seances.
> Any comments?
Why does Tor Browser bundle
come with Java Script enabled?
> tor-talk mailing list
> tor-talk at lists.torproject.org
tor-talk mailing list
tor-talk at lists.torproject.org
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the tor-talk