|
You are here |
freedom-to-tinker.com | ||
| | | | |
blog.torproject.org
|
|
| | | | | In the past few years, a technique called browser fingerprinting has received a lot of attention because of the risks it can pose to privacy. What is it? How is it used? What is Tor Browser doing against it? In this blog post, I'm here to answer these questions. | |
| | | | |
toddcullumresearch.com
|
|
| | | | | Many of us who work in the software security field even need to do a security healthcheck from time-to-time. For me, my data security also includes privacy. After all, if my data is being sent to every Tom, Dick, and Harry, then the chances that it gets into the wrong hands or hands with improper... Read More | |
| | | | |
2019.www.torproject.org
|
|
| | | | | [AI summary] The provided text is an extensive analysis of various security and privacy measures implemented in the Tor Browser to protect users from fingerprinting and other tracking techniques. It outlines the design goals and implementation status of multiple defenses, including disabling plugins, restricting access to local network information, and mitigating risks associated with HTML5 Canvas and WebGL. | |
| | | | |
djanes.xyz
|
|
| | | (This was a blog post that I originally wrote on my good friend tek's blog which can be found here: http://teklordz.net/piholeI decided to move this over to my blog to consolidate and preserve it here.) Ads... whether they are necessary/good or pure evil is outside the scope of this article. One thing that can be ... | ||