[tor-talk] Tor browser can be fingerprinted

Andrew F andrewfriedman101 at gmail.com
Thu Sep 12 00:17:47 UTC 2013


The graphics subsystem,  are being used today.
100%.  No doubt.  If your targeted, this may be used to find you.  It takes
a lot resources but its happing right now.   Opening one domain at a time
helps, but the longer your connected and the more you down load more
identifiable you are.

If your not targeted, you have nothing to worry about.



On Wed, Sep 11, 2013 at 4:43 PM, Roger Dingledine <arma at mit.edu> wrote:

> On Wed, Sep 11, 2013 at 12:50:41PM -0400, Marthin Miller wrote:
> > 1024bit RSA keys which can be cracked in a few hours
>
> I believe this to be false currently.
>
> (But that doesn't mean we shouldn't fix it, because it will become true
> some time in the next few decades, and we don't know when that will be.
> (Good thing we're fixing it.))
>
> > Also if you let users choose how much security they want that's better
> >(for example choose high padding and time delay on relays if security
> >have more priority than speed)
>
> Unfortunately, this one is more complex than you imply as well. Take a
> look at "Anonymity Loves Company: Usability and the Network Effect"
> for much more discussion here:
> http://freehaven.net/anonbib/#usability:weis2006
>
> --Roger
>
> --
> tor-talk mailing list - tor-talk at lists.torproject.org
> To unsusbscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>


More information about the tor-talk mailing list