DuckDuckGo is the default search engine, which means that you can run “!Bangs” keywords in the location bar to use any search engine.The proprietary web chat IRC client Mibbit has been removed.WebRTC is enabled like in Firefox but prevent leaking the LAN ip.The Play DRM-controlled content option (used to download and enable Widevine Content Decryption Module provided by Google Inc.) has been removed from about:preferences > Content.is not installed in about:addons > Plugins Widevine Content Decryption Module provided by Google Inc.Encrypted Media Extensions (EME) is not implemented: Whereas Firefox are being created such that they support Digital Restrictions Management (DRM) systems through their implementation of the Encrypted Media Extension (EME), GNU IceCat doesn’t include an EME implementation as it opposes efforts to popularize and ease the dissemination of DRM technology.Q: What is the difference between Firefox ESR and GNU IceCat? In order to get privacy-oriented, “Non-Tor” browser in Whonix-Workstation, we can use GNU IceCat We can use Firefox-ESR but it still has many suspicious features like Pocket, Firefox Accounts, Screenshots and so on. But if you install VPN addons right into your Tor Browser, you can be fingerprinted so it is strongly recommended to use some kind of other browser for Tor-banned sites. This would be my suggestion for counteracting a very real and significant security weakness.So, now I have a suggestion about including GNU IceCat into Whonix-Workstation repository.Ī: Because some websites blocks Tor Exit Nodes and therefore you need to use an additional Proxy/VPN after Tor (User → Tor > VPN/Proxy) in order to get Tor-unfriendly sites work. It would take a break out to do that and its VERY unlikely if you setup your VM's correctly. Obviously a simple addition such as working via virtual machines for isolation, would remove the actual physical computer's hardware from being seen as well. Unless you are way better than me, can you really even hope to provide a better "blend in" package than the TBB? That bundle package alerts for canvas fingerprinting attempts and such. I do it once in awhile where blazing speed is needed. Again, can be run well with TOR turned off. You can still sit behind multiple VPN's and/or actual TOR while using this package. So what does that do you might ask? Simple: when you surf using the TBB you look EXACTLY the same as every other generic TOR user - > blend in. You will still get the amazing protection configuration package the TOR team has setup for you. Use the TOR browser bundle, and if TOR is too slow for you, do it with TOR turned off. So what to do? As discussed in the article and I will promote it as well: forget trying to anonymize by removing identifying "things in the browser activity", and quite literally blend in! Don't panic by what I just said. If you forget even one or two things you will stand out to an advanced "attacker". I don't believe almost any user will even remotely be able to remove the fingerprinting and canvas detection traces from their systems after use. I have given this matter a great deal of attention recently. I have read several like it but I am not sure it will prompt users into action.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |