[tor-talk] Audio fingerprinting
Jonathan Wilkes
jancsika at yahoo.com
Fri Jun 3 22:47:12 UTC 2016
> So it’s not collecting sound played or recorded on a machine but rather harvesting the audio signature of the individual machine and using that as an identifier to track a web user.
"Audio signature" seems a bit broad. From what I can tell it could be doing
about three things:1) Fingerprint the browser by looking at the antialiasing method its
audiocontext implementation uses2) If the browser is branching the antialiasing method based on the
machine/processor/etc., then the miner can infer that by looking at the output.3) Measuring the time it takes the machine to generate the output.
It's a javascript api, and if you have javascript turned on there are already
way easier ways to get #1 and #2. Plus I doubt #3 would ever be the
determining factor in positively ID'ing a machine.
But it's still another bit of data. When GCC adds a line to output a caret
showing the exact column where an error starts, I go, "Oh, that's very nice!"
I'm sure the folks at the other end of your request do the same.
-Jonathan
On Friday, June 3, 2016 5:40 PM, "mrnobody at mail-on.us" <mrnobody at mail-on.us> wrote:
Actually meant if some of you anon folks knew if it was possible to
perform this deanonymisation without javascript. The "fuck javascript"
part that i know :)
juan:
> On Thu, 26 May 2016 06:23:34 +0000
> "mrnobody at mail-on.us" <mrnobody at mail-on.us> wrote:
>
>
>> uses fingerprintjs2 library.
>>
>> Any thoughts?
> fuck javascript?
>
>
--
tor-talk mailing list - tor-talk at lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
More information about the tor-talk
mailing list