[tor-talk] Audio fingerprinting

mrnobody at mail-on.us mrnobody at mail-on.us
Thu May 26 06:21:17 UTC 2016


A wide-scale study of online trackers carried out by researchers at
Princeton University has identified a new technique being used to try to
strip web users of their privacy, as well as quantifying the ongoing
usage of some better-known tracking techniques.

The new technique unearthed by the study is based on fingerprinting a
machine’s audio stack via the AudioContext API. So it’s not collecting
sound played or recorded on a machine but rather harvesting the audio
signature of the individual machine and using that as an identifier to
track a web user.

I understand that these methods are not possible without javascript, are
The example provided in the webpage:
uses fingerprintjs2 library.

Any thoughts?
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20160526/ae334b52/attachment.sig>

More information about the tor-talk mailing list