Tor Browser’s Latest Update Could Get You Fingerprinted...

  • Видео
  • О видео
  • Скачать
  • Поделиться

Tor Browser’s Latest Update Could Get You Fingerprinted...

In this video, I explain a major shift in the Tor Browser’s privacy architecture and why it’s a serious problem for anyone who values anonymity. With the release of Tor Browser 14.5, developers permanently removed the OS spoofing feature. This core safeguard made all users appear to be running Windows, regardless of their operating system. This feature was critical in reducing entropy and making users harder to be fingerprinted through HTTP headers, especially when JavaScript was disabled. Thanks to: @strml_ For pointing out: 'You should cut the second paragraph in the description and the entire section from 10-12min, it's simply not true. Tor returns 'Linux', not anything specific like Qubes or OpenBSD.' ☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆ 00:00 Intro 00:28 The Feature That Was Removed 01:04 Why OS Spoofing Mattered for Anonymity 02:01 How Metadata Narrows Identity 03:03 Quantifying Entropy Reduction 04:00 Real-World Example of Spoofing’s Value 04:56 The History of Tor’s OS Spoofing Removal 06:03 Developer Justifications and Rebuttals 07:00 Why the Logic Behind Removal Is Flawed 08:00 Final Kill Switch: Code Base Deleted 09:02 Ignored Warnings from Security Contributors 10:00 Misleading Entropy Claims and Flawed Assumptions 11:00 Rare OS Users Now Fully Exposed 12:01 JavaScript + Headers Now Match 13:14 Impact on Fingerprinting Precision 14:01 Removing Layers Makes Tracking Easier 15:28 Spoofing Used to Be Your Last Line of Defense 16:36 Fingerprinting in “Safest Mode” Now Possible 17:44 How Tails and Whonix Still Protect You 19:00 Why Tails/Whonix Are Different from Qubes/BSD 20:46 Real Mitigations You Can Still Use 21:54 Final Thoughts: Trust, Threat Models, and the Future ☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆ 🎙️ Podcast: https://rss.com/podcasts/darknet/ 🌐 Official Website: https://www.doingfedtime.com 🌐 Official Website Mirror: https://www.sambent.com 📘 Facebook: https://www.facebook.com/TheOfficialSamBent/ 🐦 Twitter/X: https://twitter.com/DoingFedTime 💼 LinkedIn: https://www.linkedin.com/in/sam-bent/ 📧 Email: contact@sambent.com 📱 TikTok: https://www.facebook.com/TheOfficialSamBent/ 📚 Amazon Author Page: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S 🌐 Dread (Onion Link): http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/d/doingfedtime 🌐 Pitch (Onion Link): http://pitchprash4aqilfr7sbmuwve3pnkpylqwxjbj2q5o4szcfeea6d27yd.onion/@doingfedtime 🐙 GitHub: https://github.com/DoingFedTime 👾 Reddit (User Account): https://www.reddit.com/user/reservesteel9/ 📽️ Rumble: https://rumble.com/c/DoingFedTime 🛡️ Breach Forums (Onion Link): http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd.onion/User-SamBent 📸 Instagram: https://www.instagram.com/sambentoffical/ 📌 Pinterest: https://www.pinterest.com/DoingFedTime/ ☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆ The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such. By watching this video, you acknowledge that you understand and agree to these terms. If you disagree with these terms, do not watch this video.
75, 897   |   1 мес. назад  |   3, 179 - 0
 

Tor Browser’s Latest Update Could Get You Fingerprinted...

Скачайте изображение (превью) выбрав качество


320x180 480x360 640x480 1280x720

In this video, I explain a major shift in the Tor Browser’s privacy architecture and why it’s a serious problem for anyone who values anonymity. With the release of Tor Browser 14.5, developers permanently removed the OS spoofing feature. This core safeguard made all users appear to be running Windows, regardless of their operating system. This feature was critical in reducing entropy and making users harder to be fingerprinted through HTTP headers, especially when JavaScript was disabled.

Thanks to: @strml_ For pointing out: "You should cut the second paragraph in the description and the entire section from 10-12min, it's simply not true. Tor returns "Linux", not anything specific like Qubes or OpenBSD."

☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆

00:00 Intro
00:28 The Feature That Was Removed
01:04 Why OS Spoofing Mattered for Anonymity
02:01 How Metadata Narrows Identity
03:03 Quantifying Entropy Reduction
04:00 Real-World Example of Spoofing’s Value
04:56 The History of Tor’s OS Spoofing Removal
06:03 Developer Justifications and Rebuttals
07:00 Why the Logic Behind Removal Is Flawed
08:00 Final Kill Switch: Code Base Deleted
09:02 Ignored Warnings from Security Contributors
10:00 Misleading Entropy Claims and Flawed Assumptions
11:00 Rare OS Users Now Fully Exposed
12:01 JavaScript + Headers Now Match
13:14 Impact on Fingerprinting Precision
14:01 Removing Layers Makes Tracking Easier
15:28 Spoofing Used to Be Your Last Line of Defense
16:36 Fingerprinting in “Safest Mode” Now Possible
17:44 How Tails and Whonix Still Protect You
19:00 Why Tails/Whonix Are Different from Qubes/BSD
20:46 Real Mitigations You Can Still Use
21:54 Final Thoughts: Trust, Threat Models, and the Future


☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆

🎙️ Podcast:
🌐 Official Website:
🌐 Official Website Mirror:
📘 Facebook:
🐦 Twitter/X:
💼 LinkedIn:
📧 Email: contact@sambent.com
📱 TikTok:
📚 Amazon Author Page:
🌐 Dread (Onion Link):
🌐 Pitch (Onion Link):
🐙 GitHub:
👾 Reddit (User Account):
📽️ Rumble:
🛡️ Breach Forums (Onion Link):
📸 Instagram:
📌 Pinterest:

☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆

The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.

By watching this video, you acknowledge that you understand and agree to these terms. If you disagree with these terms, do not watch this video.


Tor Browser’s Latest Update Could Get You Fingerprinted...

Чтобы скачать видео "Tor Browser’s Latest Update Could Get You Fingerprinted..." передвинте ползунок вправо



Покажите вашим друзьям, добавьте в соцсети

Ссылка на страницу с видео:

 

Ссылка HTML на страницу с видео:

 

Код для вставки плеера:


  • Комментарии

Комментарии ФБ


Уважаемые друзья!

Источником всего видеоконтента, в том числе проигрывающегося на страницах ресурса ruslar.me, является сторонний видео ресурс, а именно общедоступный видеохостинг YouTube.com, предоставляющий открытый доступ к своему видеоконтенту (используя открытую и общедоступную технологию video API3 youtube.com)!

Проблемы с авторскими правами

Если вам принадлежат авторские права на данное видео, которое было загружено без вашего согласия на YouTube.com, перейдите на страницу этого видео сайта YouTube.com , нажмите на ссылку под проигрывателем Ещё -> "Пожаловаться" -> "Нарушение моих прав" и в выпадающем меню, выбирите, что именно нарушается и нажмите кнопку "Отправить".



Неприемлемый контент

Чтобы сообщить о неприемлемом видео, перейдите на YouTube, нажмите на ссылку под проигрывателем Ещё -> "Пожаловаться" и выберите в "Сообщить о нарушении" что именно вас не устраивает в этом видео. Подробнее о наших правилах читайте в Условиях использования.