The few proprietary closed source software(Games, Sublime Text) that I do run, I run them in SandBoxie or QEMU. There are also various services that are insecure and must be turned off - UPnP, Print Spooler, RDP etc. I run a combination of uMatrix(which again, while no longer maintained, it works great in whitelist mode), and NoScript on my Firefox web browser which I run inside Sandboxie. I run a combination of Peerblock(while no longer maintained, it works splendidly in whitelist mode), and Simplewall Firewall. My router runs PFSense with Suricata, and I encrypt my DNS traffic. It is absolutely possible to run Windows 7 reasonably securely.īut the way in which I keep it secure might be a little cumbersome to some. Which would be a dick move, especially because Firefox, on which Tor Browser and Mullvad Browser are based, still supports Windows 7. Unless they deliberately coded it in like My point is that if it's just Tor Browser without Tor, then there's functionally no reason to have that build be incompatible with Windows 7. The entire javascript engine should be ripped apart and reassembled so that all privacy invading features can only function for client-side specific tasks but cannot speak with the networking and storage features. Plausible randomness is far superior to trying to build up a large enough crowd and simultaneously solving the uniformity issues. Some of the fingerprints in the browser are already randomized. I mentioned in a different comment that the alternative to uniform blending is randomness. Now read that again, and this time assume hostile intent. Modification of the browser is discouraged for any reason, including enhancing privacy features. IMO, browsers should never have been flooded with so many uncontrolled privacy breaking features in the first place. It's especially suspicious to me that the Tor project never achieved it, despite having had multiple years of developer effort dedicated to this goal, and backed by funding. I personally don't see why a source-modified browser shouldn't be able to achieve perfect uniformity. Blending into a crowd on the surface seems like a good idea, assuming the crowd was large enough, but that "per OS" detail is a big gotcha. Let's proceed with the discussion as though the above issues were not present.Īfter looking at the issue tracker, this project wants each Mullvad Browser user to look the same, per OS. Incidentally, there are frequent dropped requests using this browser. TLS finger print is device specific and persistent. Font finger print is device specific and persistent. WebGL finger print is device specific and persistent.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |