-
Notifications
You must be signed in to change notification settings - Fork 238
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Discussion: UA: window vs iframe #193
Comments
Not only different. |
The latest version of Random Agent Spoofer now spoofs also the iframe, you have to enable script injection |
I have just run the tests mentioned above (mostly http://www.darkwavetech.com/fingerprint/fingerprint_truebrowser.html, http://www.darkwavetech.com/fingerprint/fingerprint_os.html), using various spoofed User-Agent strings (real browser/version/OS is Firefox 53 on Linux 64 bits):
Note that javascript has to be enabled for the test to run. Results:
While fingerprinting tests can successfully uncloak a browser pretending to be a different browser, there is no evidence that it can detect 1. a spoofed operating system substring 2. A spoofed version substring. Buty anyway I suggest that we leave the User-Agent pref commented out. If you need to defend against advanced fingerprinting techniques there is a chance that you should be using Tor browser directly in the first place (UA string only adds a small amount of entropy). Spoofing UA also has indirect disadvantages (websites nagging you about your browser being too old/unsupported, disabled functionality such as on AMO, etc.) I think that this issue can be closed. |
Yes, it was tested. See here. We're leaving it there. The thing I worry about in this, is that when crafting client-side exploits against the browser, an attacker can practice with the same exact version and get to a whole different level of precision to perfect the exploit. Security is never perfect and as @Thorin-Oakenpants so often points out, that there are still ways to FP the browser, which of course is true. But it's about raising the bar and making the attackers work harder. This applies to privacy as well... even though it doesn't mean squat against advanced FP techniques, it still matters. Also see the discussion in commit 35b9892. |
snip
The text was updated successfully, but these errors were encountered: