#1494 How to obfuscate the browser fingerprint with Privoxy

pending
5
2012-05-23
2012-05-22
Jaap
No

The EFF has an excellent proof of concept fingerprinting tool on https://panopticlick.eff.org/ . They seem to be able to identify my browser as a unique one. In my testing I figured out that this is mainly caused by the 'Browser plugins details' and 'system fonts'. Is there a way for Privoxy to hide these details?

I'm currently using Privoxy 3.0.19 with Google Chrom 19.0.1084.46 m. But as I have multiple machines(windows, mac and linux) connecting to a Linux Privoxy proxy server, I assume the browser is not really relevant. (I'd like a solutions that works on every machine). I'm not using other proxy's.

- Preaper

Discussion

  • Fabian Keil

    Fabian Keil - 2012-05-22

    Privoxy doesn't filter HTTPS traffic and thus can't hide anything in it.

    Even without HTTPS, using Privoxy to prevent browser fingerprinting is unrealistic in general, unless you know the mechanisms used ahead of time and write a filter to fool them.

     
  • Fabian Keil

    Fabian Keil - 2012-05-22
    • assigned_to: nobody --> fabiankeil
    • status: open --> pending
     
  • Jaap

    Jaap - 2012-05-22

    That made me realize there is quite a caveat in the proxy approach. Basically we need Privoxy to act as a trusted MITM in order to handle SSL traffic.

    How about for non-https traffic. Could we still block out the 'Browser plugins details' and 'system fonts'?

     
  • Jaap

    Jaap - 2012-05-22
    • status: pending --> open
     
  • Fabian Keil

    Fabian Keil - 2012-05-23
    • status: open --> pending
     

Log in to post a comment.

Get latest updates about Open Source Projects, Conferences and News.

Sign up for the SourceForge newsletter:

JavaScript is required for this form.





No, thanks