Which approach is technically more effective to hinder user tracking – fingerprint generalization or randomization?

Tor’s approach to countering fingerprinting is to make as many users “appear the same” as possible. Let us call this “generalization”. While Brave tries to randomize all fingerprints of each and every user in a unique way (for each new ope… Continue reading Which approach is technically more effective to hinder user tracking – fingerprint generalization or randomization?

What are the various defense mechanisms against audio fingerprinting

L. Cuccovillo in his paper Audio tampering detection via microphone classification talks about identification of the uniqueness in the output generated by the microphones which can act as a fingerprint for the device.

What are the possi… Continue reading What are the various defense mechanisms against audio fingerprinting

Can I bypass basic auth to fingerprint a web server with Httprint or netcat? [closed]

There is a web server I’d like to recon using httprint.

But that web server has a basic auth protection on 443. Port 80 is not responding.
When I launch httprint, it says Unspecified Error

The same thing happens with netcat. It fails bec… Continue reading Can I bypass basic auth to fingerprint a web server with Httprint or netcat? [closed]

How to configure a VM to protect all my hardware fingerprint from guest OS and softwares?

This question was originally Does Firefox in VM have a common enough fingerprint so I don’t need tor browser? in Tor community.

I want to know about what a web browser’s fingerprint like in a VM, if
VM runs a common OS and have defau… Continue reading How to configure a VM to protect all my hardware fingerprint from guest OS and softwares?

How can we protect encrypted files and directories from being fingerprinted when stored on online storage services?

Assuming that online storage providers are considered untrusted, if files and directories are encrypted, how can these be protected against fingerprinting?

The files are encrypted using rclone’s implementation of Poly1305 an… Continue reading How can we protect encrypted files and directories from being fingerprinted when stored on online storage services?