Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fingerprinting #135

Open
rodarima opened this issue Apr 14, 2024 · 0 comments
Open

Fingerprinting #135

rodarima opened this issue Apr 14, 2024 · 0 comments
Labels
enhancement New feature or request network

Comments

@rodarima
Copy link
Member

We may want to have some estimate in the amount of entropy we are leaking to find out what is the current fingerprinting capability of a given adversary when using Dillo. Setting the user agent to Dillo already cuts the whole population to probably less than 1ppm, but that is easily solvable.

Not having support for JavaScript certainly helps, but we may be still leaking some information in HTTP headers or in the way we deal with the sockets.

AFAIK, there is no tool to measure uniqueness that works without JS.

https://www.w3.org/TR/fingerprinting-guidance/
https://2019.www.torproject.org/projects/torbrowser/design/#fingerprinting-linkability

@rodarima rodarima added network enhancement New feature or request labels Apr 14, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request network
Projects
None yet
Development

No branches or pull requests

1 participant