On Mo, Sep 08, 2014, Jorge Arellano Cid wrote:
Hi,
This site is interesting. It gives kind of a score of web browser trackability. [1]
@corvid, I thought you'd like to give it a look (AFAIR, you have submitted some standardizing to our HTTP querying in the past). It looks like our HTTP_ACCEPT and "User Agent" are the most vulnerable to tracking.
It looks simple to provide some less unique alternatives in dillorc.
I once started to read the paper (stopped where the math gets too complcated ;-) ); I remember that it is relatively simple to track a browser even if the browser fingerprint, which consists of numerous attributes, changes slightly when only few attributes (e. g. browser version) change. This gave me a vague idea to randomize these attributes exactly in a way to break re-detection. Dillo could perhaps be a good testbed for this.
DISCLAIMER: this is just on little aspect of the privacy chain. Most probably this is moot unless you're behind a TOR ring. YMMV.
For what I've understood, TOR wouldn't help. Sebastian