Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Not An Issue: Detectability of POOP and its impact on browser's fingerprint. #26

Open
rarecaller opened this issue Aug 11, 2019 · 4 comments
Labels
question Further information is requested

Comments

@rarecaller
Copy link

If possible, I'd like to know how POOP matches Tor's uniformity strategy. In other words, if POOP is installed in my Tor Browser, can the websites detect its activity on my side and thus distinguish me from other Tor users? It'd be great to understand the overall impact on the browser's fingerprint.

@claustromaniac
Copy link
Owner

claustromaniac commented Aug 12, 2019

if POOP is installed in my Tor Browser, can the websites detect its activity on my side and thus distinguish me from other Tor users?

I already answered this particular question here. The short answer is yes.

It'd be great to understand the overall impact on the browser's fingerprint.

The impact is described in the documentation. This extension is not a tool against fingerprinting: it's a tool that prevents some fairly common very specific data leaks. POOP does not actively try to make you stand out, but the difference in your fingerprint is very intentional, because said difference is merely the absence of those data leaks. When servers expect your browser to leak that data and then notice it didn't, that automatically makes your browser look different to them than the rest of its visitors who don't have POOP (or a similar extension) installed. That is all there is to it.

@claustromaniac claustromaniac added the question Further information is requested label Aug 12, 2019
@rarecaller
Copy link
Author

rarecaller commented Aug 12, 2019

Oh, the world is small! At first I didn't realize that the man from that community and the man behind the POOP is the same person.

But since this issue is already created anyway, may I additionally ask for your subjective opinion: comparing the privacy risks that POOP eliminates with privacy risks caused by sacrificing Tor's uniformity for POOP's sake - what would you choose to reduce traceability?

@claustromaniac
Copy link
Owner

The Tor Browser is a tool, and like any other tool, it can be misused. Someone who misuses it might actually benefit from installing POOP in some scenarios, but I would generally advice against installing any extensions in that browser (POOP included).

@rarecaller
Copy link
Author

rarecaller commented Aug 13, 2019

The problem is that today there is just no desktop browser, properly designed for everyday privacy needs, so I don't see any other choice but to misuse something like Tor Browser. Almost all the browsers that are said to be privacy-focused are actually leaky faucets which still reveal many enough parameters convenient to track us easily. If I were adverting company, I'd just drop the points altering by this placebo tools and focus on the rest.

Previously, I also had spent a lot of time trying to make something decent from the basic Firefox, but then realized that it was just as pointless as trying to cook soup in a colander. In my opinion, only the Tor Browser developers really do something out of the placebo category. That's why I use it as the basis for my setup. And I'm also excited about last year's Safari update with its "Fingerprinting defense", as it could be a big step towards true uniformity. However, I have not yet investigated it closely.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
question Further information is requested
Projects
None yet
Development

No branches or pull requests

2 participants