On Tue, Apr 25, 2017 at 2:15 AM, Mirimir <miri...@riseup.net> wrote: > On 04/24/2017 07:00 PM, c...@browserprint.info wrote:>> >> Could you please do me (and science) a favor and go to my site ( >> https://browserprint.info ) using the Tor Browser Bundle and submit a >> fingerprint, making sure to fill in the optional questionnaire? >> >> At the moment I'm working on detecting a person's underlying >> operating system and browser family using their browser fingerprint. >> The aim of this is to detect and defeat browser spoofing. The number >> of Tor Browser Bundle users who have gone to my site and done this is >> extremely low, so I'm not able to properly train my detector to >> defeat the TBB, nor am I able to gauge how effective my detector is >> against the TBB. >> >> Rest assured that I will not use your data for anything malicious, >> nor will I attempt to deanonymise you in any way. > > Not malicious, you say? Browser spoofing is a key feature of Tor > browser. Defeating that sounds rather malicious.
Were it to be defeated, the feature sounds pretty weak. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk