Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>...if they're like Tor and their responses to deanonymizing OS reporting (basically hostile and attacking), it wouldn't surprise me.

Can you be more specific about this? I've met several of the devs and they seem open to bug reports, and the Tor blog is always being updated with notes about various fixes that have been implemented...



Tor silently, last October, quit spoofing OS and now reports over browser headers what OS you are.

Previously, every Tor Browser was "windows".

The claim I've heard was that there were JavaScript attacks that could uncover what OS you were using. Patching those would be 'too hard'. So now TBB just gives up OS. Seems not very good to voluntarily give up bits of PII.

https://m.youtube.com/watch?v=3wlNemFwbwE is where I was made aware of this problem. I verified it on my infrastructure too.


Without knowing anything about Tor, I'd guess you've got it backwards. I imagine Tor leaks your OS through TCP/IP fingerprinting, and whether that fingerprint matches your `navigator.platform` is probably a factor into whether e.g. Cloudflare hellbans you.

Then again, I'd also assume Cloudflare just de facto hellbans all Tor exit node IPs, so...


Doesn’t TCP/IP fingerprinting only reach your first hop node though?


I was looking more for a whitepaper or blog post, a random youtube video is not an acceptable source for debating the integrity of a browser.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: