[tor-talk] Spoofing a browser profile to prevent fingerprinting

Mirimir mirimir at riseup.net
Tue Jul 29 16:40:13 UTC 2014


On 07/29/2014 10:09 AM, OpenPGP wrote:
> Hi all,
> 
> has anybody tried the solution mentioned in http://www.ianonym.com ?
> I'm just reading all the stuff and information but feel a bit lost :p how to 
> set it al and use it ;)

My word, that is complicated!

But even so, if only a few use it with Tor, they probably stand out.
More generally, the greater the diversity of anonymization options, the
less anonymity there is :(

>> Aymeric Vittesal:
>> ...
>> Or unless you use something like http://www.ianonym.com, it was designed
>> to defeat all forms of tracking/fingerprinting with the fake domain
>> concept and hide your destination even with https.
>>
>> Since it takes control over the whole web page, the js interactions are
>> sandboxed with a script to "tame" the page, a prototype was working but
>> maybe it's a bit too complicate...
>>
>> Regards
> 
>> 
> 
> ______________________________
> http://www.openpgp.org
> https://www.gnupg.org
> ______________________________________________________________
> 
> 
> 


More information about the tor-talk mailing list