New low cost traffic analysis attacks and mitigations

Agreed. Anything that requires to open a port in any users local physical modem/router is going to fail. Most won’t be able to do that. At best for advanced users.

Which options are left?

Snowflake? Is that a “real bridge” for the purpose of this issue that helps defeating this attack?

Does that contradict Tor Entry Guards - Whonix ?

The Design and Implementation of the Tor Browser [DRAFT] contradicts this.

Add uBlock Origin to the Tor Browser:

Network fingerprint from internet service provide (ISP) perspective. Not web fingerprint from website perspective.

Users would probably love ad blocking by default. So would I. We can consider ad blocking for usability too.

Ad blocking would worsen the fingerprint, so goes the argument. Is that really so? I speculate this argument might be mostly based authority and unrealistic expectations for future TBB improvements. But is it backed by actual knowledge, testing, data? Measurable worse?

See tbb-linkability [archive] and tbb-fingerprinting [archive]. I speculate these bugs might not br fixed soon, other similar issues are identified meanwhile. The worse fingerprint might not matter as TBB might never be good enough for ad blocking to matter?

Problem is that it is an “inside” Tor Browser issue. Once Tor Browser was inside modified, all Tor Browser issues would be blamed on Whonix. Similar to add Tor Browser first startup popup to ask whether security slider should be set to safest

“Inside” Tor Browser modifications are fragile as add Tor Browser first startup popup to ask whether security slider should be set to safest has shown. Tails cannot be compared much? Whonix / Tor Browser can be upgraded anytime. Tails not so much since its mostly release based updated?

quote Tips on Remaining Anonymous

1 Like