Anyone have any good information on using ublock origin with tor browser? Does it compromise my anonymity?

  • @Lunacy@lemmy.ml
    link
    fedilink
    13 years ago

    It’s highly discouraged to add further add ons on Tor since you will be more easily fongerprintable.

    The only thing you should change on Tor are security settings, nothing else.

  • @nikifa@lemmy.ml
    link
    fedilink
    03 years ago

    silly comments. Tails is using ublock orgin for Tor browser they ship with.

    “Don’t use Tails it ruins your OP sec” lol.

    • @Lunacy@lemmy.ml
      link
      fedilink
      0
      edit-2
      3 years ago

      A difference is that Tails includes the uBlock Origin extension, which removes advertisements. If an attacker can determine that you are not downloading the advertisements that are included in a webpage, that could reveal that you are a Tails user.

      https://tails.boum.org/doc/anonymous_internet/Tor_Browser/index.en.html

      edit:

      Site-specific or filter-based addons such as AdBlock Plus, Request Policy, Ghostery, Priv3, and Sharemenot are to be avoided. We believe that these addons do not add any real privacy to a proper implementation of the above privacy requirements, and that development efforts should be focused on general solutions that prevent tracking by all third parties, rather than a list of specific URLs or hosts.

      Implementing filter-based blocking directly into the browser, such as done with Firefox’ Tracking Protection, does not alleviate the concerns mentioned in the previous paragraph. There is still just a list containing specific URLs and hosts which, in this case, are assembled by Disconnect and adapted by Mozilla.

      Trying to resort to filter methods based on machine learning does not solve the problem either: they don’t provide a general solution to the tracking problem as they are working probabilistically. Even with a precision rate at 99% and a false positive rate at 0.1% trackers would be missed and sites would be wrongly blocked.

      Filter-based solutions in general can also introduce strange breakage and cause usability nightmares. For instance, there is a trend to observe that websites start detecting filer extensions and block access to content on them. Coping with this fallout easily leads to just whitelisting the affected domains, hoping that this helps, defeating the purpose of the filter in the first place. Filters will also fail to do their job if an adversary simply registers a new domain or creates a new URL path. Worse still, the unique filter sets that each user creates or installs will provide a wealth of fingerprinting targets.

      https://2019.www.torproject.org/projects/torbrowser/design/#philosophy

      This is literally documentation taken from the Tor Project.

      • @Brattea@lemmy.ml
        link
        fedilink
        03 years ago

        Here’s the thing tho, u block might be good for your threat model. Depends what it is. any way if you are surfing clear web you got more serious opsec concerns.

    • @TheAnonymouseJoker@lemmy.mlM
      link
      fedilink
      -33 years ago

      99% people have zero idea when they give advice using buzzwords. These people are either spreading misinformation, or are grifters (few of them).

      If uBlock Origin is creating more attack surface, being a highly vetted, open source addon for REDUCING attack surface, that should tell you about advice you should be taking from such idiots.

      I am one of the main people who has brought back focus on threat modelling and opsec, and I am glad that it is also differentiating the grift from the good advice, and not just guiding everyone towards a less tinfoil, more saner path to privacy.