Notice: This doesn’t mean that Tor is broken.
Security Enthusiast Jose Carlos Norte recently made a blog post detailing how Tor Browser users can be uniquely fingerprinted using the mouse wheel, mouse speed, a CPU benchmark, and “getClientRects”.
A POC (proof-of-concept) is available to try out which utilizes the methods he goes over.
With that out of the way, Norte moved on to fingerprinting the mouse wheel where he states that “the mouse wheel event in Tor Browser (and most browsers) leaks information of the underlying hardware used to scroll the webpage.” He contrasted what’s leaked when you use a regular mouse or a trackpad:
Read more ... source: DeepDotWeb
Advertise on the Bitcoin News
Do you like The Bitcoin News ? Thank you for Support us !