[tor-talk] Spoofing a browser profile to prevent fingerprinting

OpenPGP openpgp at openmailbox.org
Tue Jul 29 16:09:29 UTC 2014


Hi all,

has anybody tried the solution mentioned in http://www.ianonym.com ?
I'm just reading all the stuff and information but feel a bit lost :p how to 
set it al and use it ;)

> Aymeric Vittesal:
> ...
> Or unless you use something like http://www.ianonym.com, it was designed
> to defeat all forms of tracking/fingerprinting with the fake domain
> concept and hide your destination even with https.
> 
> Since it takes control over the whole web page, the js interactions are
> sandboxed with a script to "tame" the page, a prototype was working but
> maybe it's a bit too complicate...
> 
> Regards

✡


______________________________
http://www.openpgp.org
https://www.gnupg.org
______________________________________________________________
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 213 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20140729/00fa2cc7/attachment.sig>


More information about the tor-talk mailing list