![]() ![]() However, if you expect that your adversary has sufficient resources and interest in you to follow you around via your fingerprint, then it would be very advisable to use Tor Browser in the "safest" setting to obscure that fingerprint. That is, who is your "adversary" in this case, and how much resources and interest in you do they have? To answer the question in your post's title, just using Tor Browser in itself (even on its least restrictive settings) will inherently make it much more difficult for adversaries to determine your identity than if you had used a normal browser. So, the key security concept I think you're looking for here is " threat model". JavaScript is problematic because of just how powerful it is malicious JavaScript can cause your browser to do abusive things, even to the point of leaking your IP address. For example, if you have an unusual font installed on your computer, a website can ask your browser if you support that font, and if your browser says yes, then that makes you stand out. ![]() These things can be used to "fingerprint" you or in other words distinguish you from other Tor users. Tor Browser's "safest" setting primarily blocks JavaScript, as well as "some fonts, icons, math symbols, and images", and it makes it so that you have to click on a video in order to play it. Use your best judgment based on your circumstances. ![]() TL DR: Using Tor Browser not at the "safest" level may cause the browser to leak information about your computer that can be used to distinguish you from other Tor users, and this information can be used to compromise your anonymity, but only if you have an adversary that has a lot of resources and interest in you. ![]()
0 Comments
Leave a Reply. |