[linux-elitists] Browser fingerprinting

coderman coderman at gmail.com
Mon Oct 7 01:16:54 PDT 2013


On Mon, Oct 7, 2013 at 12:09 AM, coderman <coderman at gmail.com> wrote:
>  [... re: panopticlick ... ]
> Tor Browser... just use it in an isolated environment like Qubes,
> Whonix, Tails, etc.

to be clear, this is true when running Tor and the browser on the same
computer, or having a Tor router / proxy appliance that you connect to
as transparent proxy.

in the latter case, you would still be best served by running a copy
of the Tor Browser in "Transparent Tor" mode[0], which delegates
routing through Tor to another service, while providing a browser
environment with all of the useful protections[1] to avoid this very
problem and many others.


0. "Tor Browser - Whonix" transparent proxy mode
  https://www.whonix.org/wiki/Tor_Browser
NOTE: even in this mode, you may want to have the Tor router provide
local access to the SOCKS port directly.

1. "The Design and Implementation of the Tor Browser"
  https://www.torproject.org/projects/torbrowser/design/



More information about the cypherpunks mailing list