[tor-talk] Spoofing a browser profile to prevent fingerprinting

Öyvind Saether oyvinds at everdot.org
Fri Aug 1 01:44:08 UTC 2014


> The simplest way would be to add a VE service on a TOR relay
> publishing a browser. You would not only be asking TOR relay
> providers to donate some bandwidth but also some processing power.

So I run the relay with a VE and now I get to see what everyone using
that VE is doing? I am not sure this is a good idea.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 181 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20140801/28c154cd/attachment.sig>


More information about the tor-talk mailing list