> On 04/24/2017 07:00 PM, c...@browserprint.info wrote: > > Hello, Tor community! > > > > Could you please do me (and science) a favor and go to my site ( > > https://browserprint.info ) using the Tor Browser Bundle and submit a > > fingerprint, making sure to fill in the optional questionnaire? > > > > At the moment I'm working on detecting a person's underlying > > operating system and browser family using their browser fingerprint. > > The aim of this is to detect and defeat browser spoofing. The number > > of Tor Browser Bundle users who have gone to my site and done this is > > extremely low, so I'm not able to properly train my detector to > > defeat the TBB, nor am I able to gauge how effective my detector is > > against the TBB. > > > > Rest assured that I will not use your data for anything malicious, > > nor will I attempt to deanonymise you in any way. > > > > Thank you! > > Not malicious, you say? Browser spoofing is a key feature of Tor > browser. Defeating that sounds rather malicious. > -- > tor-talk mailing list - tor-talk@lists.torproject.org > To unsubscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > e > >
You can't build defenses to attacks that nobody knows about. And if I'm the one who develops the attack it'll be public knowledge; can't say the NSA would be so gracious. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk