Damian Johnson commited on 2017-01-29 22:15:24
Zeige 1 geänderte Dateien mit 0 Einfügungen und 54 Löschungen.
Kinda confusing since they called it 'Fingerprint Central' instead but from what I can tell this was Pierre Laperdrix's project last year.
... | ... |
@@ -896,60 +896,6 @@ the codebase that you want to work on. |
896 | 896 |
</p> |
897 | 897 |
</li> |
898 | 898 |
|
899 |
- <a id="panopticlick"></a> |
|
900 |
- <li> |
|
901 |
- <b>Panopticlick</b> |
|
902 |
- <br> |
|
903 |
- Likely Mentors: <i>Georg (GeKo)</i>, <i>Günes Acar</i>, <i>Nicolas (boklm)</i> |
|
904 |
- <p> |
|
905 |
- |
|
906 |
-The <a href="https://panopticlick.eff.org">Panopticlick project by the EFF</a> |
|
907 |
-revolutionized how people think about <a |
|
908 |
-href="https://panopticlick.eff.org/static/browser-uniqueness.pdf">browser |
|
909 |
-fingerprinting</a>, both by developing tests and metrics to measure browser |
|
910 |
-fingerprintability, and by crowdsourcing the evaluation and contribution of |
|
911 |
-individual browser features to overall fingerprintability. |
|
912 |
- |
|
913 |
- </p> |
|
914 |
- <p> |
|
915 |
- |
|
916 |
-Unfortunately, the way Panopticlick is designed <a |
|
917 |
-href="https://blog.torproject.org/blog/effs-panopticlick-and-torbutton">makes |
|
918 |
-it difficult</a> to evaluate defenses to browser fingerprinting, especially |
|
919 |
-for browsers with a relatively small userbase such as Tor Browser. This is |
|
920 |
-because any approach we take to reduce fingerprinting automatically makes our |
|
921 |
-users more distinct from the previous users who submitted their fingerprint |
|
922 |
-data to the EFF. Indeed, it is also impossible to ever expect that users of |
|
923 |
-one browser will ever be able to blend in with users of another browser |
|
924 |
-(Chrome users will always be distinguishable from Firefox users for example, |
|
925 |
-based on feature set alone). |
|
926 |
- |
|
927 |
- </p> |
|
928 |
- <p> |
|
929 |
- |
|
930 |
-To address this, we would like to have <a |
|
931 |
-href="https://trac.torproject.org/projects/tor/ticket/6119">our own |
|
932 |
-fingerprint test suite</a> to evaluate the fingerprintability of each browser |
|
933 |
-feature for users running a specific Tor Browser version. There are also <a |
|
934 |
-href="https://trac.torproject.org/projects/tor/query?keywords=~tbb-fingerprinting">additional |
|
935 |
-fingerprinting tests</a> we can add beyond those deployed by Panopticlick. |
|
936 |
- </p> |
|
937 |
- <p> |
|
938 |
- |
|
939 |
-For this project, the student would develop a website that users can |
|
940 |
-voluntarily visit to test and record their Tor Browser fingerprint. The user |
|
941 |
-should get feedback on how she performed and the test results should be |
|
942 |
-available in a machine readable format (e.g. JSON), broken down by Tor Browser |
|
943 |
-version. In a second step one could think about adding more sophisticated |
|
944 |
-tests or supporting other browser vendors that might want to test the |
|
945 |
-uniformity amongst their userbase as well. Of course, results from each |
|
946 |
-browser would also need to be broken down by both browser implementation and |
|
947 |
-version, so that results would only reflect the population of that specific |
|
948 |
-implementation. |
|
949 |
- |
|
950 |
- </p> |
|
951 |
- </li> |
|
952 |
- |
|
953 | 899 |
<a id="stegotorus"></a> |
954 | 900 |
<li> |
955 | 901 |
<b>Make Stegotorus deployment ready</b> |
956 | 902 |