Tor fingerprinting: Tor browser can mitigate browser fingerprinting?

3Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The onion router (Tor) is currently the most powerful and prominent tool to achieve online privacy on the Internet. As a browser, Tor can protect web users by not revealing the source or destination IP address, and it also prevents web tracking with HTTP cookies. Tor browser has been updated continuously to resist de-anonymizing attacks by restricting the browser’s functions, e.g., excluding all plugins such as Flash player. On March 2016, Jose Norte posted the article as “Advanced Tor Browser Fingerprinting” in his blog [37]. It suggested that browser fingerprinting can track Tor browser. In this paper, we examined how secure Tor browser version 5.5 is against browser fingerprinting. Our study concludes that Tor user accesses can be distinguished: 14.28% of Tor browser version 5.5 can be identified within two weeks at our experimental sites, although 70.0% of the older versions can. In this paper, we analyze the current features of Tor browser against browser fingerprinting and also show capabilities to track Tor browser accesses.

Cite

CITATION STYLE

APA

Saito, T., Takahashi, K., Yasuda, K., Tanabe, K., Taneoka, M., & Hosoya, R. (2018). Tor fingerprinting: Tor browser can mitigate browser fingerprinting? In Lecture Notes on Data Engineering and Communications Technologies (Vol. 7, pp. 504–517). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-319-65521-5_44

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free