Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

It's not just your browser: Your machine can be fingerprinted easily
The Register ^ | 1/13/16 | Richard Chirgwin

Posted on 01/12/2017 7:17:47 PM PST by markomalley

It just got a lot harder to evade browser fingerprinting: a bunch of boffins have worked out how to fingerprint the machine behind the browser, using only information provided by browser features.

Like so many ideas, it's obvious once someone's thought of it: activities that aren't processed in the browser are treated the same whether the page is rendered in (say) Chrome, Firefox, IE or Edge.

The group – Yinzhi Cao and Song Li of from Lehigh University in Pennsylvania, and Erik Wijmans Washington University in St. Louis – have worked out how to access various operating system and hardware-level features that can fingerprint an individual machine, regardless of browser.

These include screen resolution with zoom; CPU virtual cores; installed fonts and writing scripts; the AudioContext call; GPU features such as line and curve rendering, anti-aliasing, shading, and transparency; and more.

The researchers reckon they can fingerprint a machine with 99.24 per cent accuracy (compared to under 91 per cent for browser fingerprinting).

Cao and friends say there's one browser that defeats the worst of their attacks: the Tor browser. That's because the Tor people have the position of being paranoid by default: it normalises many of the outputs Cao uses. The only features not given fake values by the Tor browser, the paper says, are screen width-to-height ratio, and AudioContext.

Cao has published the paper at his personal page, here. ®


TOPICS: Computers/Internet
KEYWORDS: bigbrother; browsers; computersecurity; internet; privacy; tech; windows; windowspinglist

1 posted on 01/12/2017 7:17:47 PM PST by markomalley
[ Post Reply | Private Reply | View Replies]

To: markomalley

What?


2 posted on 01/12/2017 7:21:59 PM PST by dynoman (Objectivity is the essence of intelligence. - Marilyn vos Savant)
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

interesting post. :-)


3 posted on 01/12/2017 7:27:25 PM PST by Secret Agent Man ( Gone Galt; Not averse to Going Bronson.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dynoman

True dat. Apache server logs each transaction and provides a lot of information on the type of macine being used


4 posted on 01/12/2017 7:27:43 PM PST by Pikachu_Dad ("the media are selling you a line of soap")
[ Post Reply | Private Reply | To 2 | View Replies]

To: markomalley
surprised they can't find the windows ID-KEY
5 posted on 01/12/2017 7:28:03 PM PST by Chode (may the RATS all die of dehydration from crying)
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley
From the paper:

In the paper, we propose a (cross-)browser fingerprinting based on many novel OS and hardware level features, e.g., these from graphics card, CPU, audio stack, and installed writing scripts. Specifically, because many of such OS and hardware level functions are exposed to JavaScript via browser APIs, we can extract features when asking the browser to perform certain tasks through these APIs.

One more reason why my motto is "NoScript is your friend."

6 posted on 01/12/2017 7:46:09 PM PST by snarkpup (Socialism causes the worst people to become in charge, if they aren't already.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley
His paper is here:

http://yinzhicao.org/TrackingFree/crossbrowsertracking_NDSS17.pdf

7 posted on 01/12/2017 7:48:57 PM PST by TChad (Propagandists should not be treated like journalists.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Chode

Of course, they can’t find who got into Hillary’s open server,
or who made up the phony attack on Trump...


8 posted on 01/12/2017 7:49:06 PM PST by CondorFlight (I)
[ Post Reply | Private Reply | To 5 | View Replies]

To: markomalley

Hmmm....

So, use and TOR and top it off with another VPN.


9 posted on 01/12/2017 7:51:59 PM PST by Vendome (Don't take life so seriously-you won't live through it anyway - "Enjoy Yourself" ala Louis Prima)
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

Have several VMs and alternate in their use.


10 posted on 01/12/2017 7:56:36 PM PST by pluvmantelo (Boomer Presidents:The Grifter, The Midget & The Traitor. Hoping Trump is The Boss)
[ Post Reply | Private Reply | To 1 | View Replies]

To: pluvmantelo

+1


11 posted on 01/12/2017 8:07:00 PM PST by antidisestablishment ( We few, we happy few, we basket of deplorables)
[ Post Reply | Private Reply | To 10 | View Replies]

To: markomalley; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; amigatec; AppyPappy; arnoldc1; ...
Privacy concerns ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

12 posted on 01/12/2017 8:39:19 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Vendome
TOR was designed by the Security Services... to draw in folks who want to hide their online activities.
13 posted on 01/12/2017 8:45:34 PM PST by MIA_eccl1212 (10 rounds 10 meters 10 seconds 10 centimetres T)
[ Post Reply | Private Reply | To 9 | View Replies]

To: markomalley

MAC address.....yeah they can be spoofed, but TOR spoofs the variables these guys are collecting.


14 posted on 01/12/2017 8:46:01 PM PST by HonkyTonkMan
[ Post Reply | Private Reply | To 1 | View Replies]

To: MIA_eccl1212

From the article I linked above: “Let’s start with the basics: Tor was developed, built and financed by the US military-surveillance complex. Tor’s original — and current — purpose is to cloak the online identity of government agents and informants while they are in the field: gathering intelligence, setting up sting operations, giving human intelligence assets a way to report back to their handlers — that kind of thing. This information is out there, but it’s not very well known, and it’s certainly not emphasized by those who promote it.”


15 posted on 01/12/2017 8:50:57 PM PST by MIA_eccl1212 (10 rounds 10 meters 10 seconds 10 centimetres T)
[ Post Reply | Private Reply | To 13 | View Replies]

To: MIA_eccl1212

Wow.

They were also instrumental in developing encryption,yet I still use it.


16 posted on 01/12/2017 10:44:34 PM PST by Vendome (Don't take life so seriously-you won't live through it anyway - "Enjoy Yourself" ala Louis Prima)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Vendome

Bookmark


17 posted on 01/12/2017 11:28:58 PM PST by publius911 (IMPEACH HIM NOW evil, stupid, insane ignorant or just clueless, doesn't matter!)
[ Post Reply | Private Reply | To 16 | View Replies]

To: publius911; MIA_eccl1212

My epic post from 3 years ago.

History lessons on telecom and how we got here [gov spying on all citizens]
Vanity
http://www.freerepublic.com/focus/news/3032748/posts?q=1&;page=1#1


18 posted on 01/12/2017 11:35:30 PM PST by Vendome (Don't take life so seriously-you won't live through it anyway - "Enjoy Yourself" ala Louis Prima)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Vendome

EXACTLY. Pay for your VPN with Bitcons w/ anon e-mail... heh heh


19 posted on 01/13/2017 6:43:17 AM PST by hawg-farmer - FR..October 1998 (------->VMFA 235 '69-'72 KMCAS <------- "Death Angels")
[ Post Reply | Private Reply | To 9 | View Replies]

To: markomalley

Sonar gear has long been able to distinguish between boats of the same designation.


20 posted on 01/13/2017 4:30:56 PM PST by Ozark Tom
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson