The Fingerprints of Abrowser
- Vous devez vous identifier ou créer un compte pour écrire des commentaires
Hi,
Here I would like to address two issues relating to privacy of our Abrowser:
1. The fingerprints of my Abrowser gave me like this:
User Agent:
Mozilla/5.0 (X11; Linux x86_64; rv:41.0) Gecko/20100101 Firefox/41.0
HTTP_ACCEPT Headers :
text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 gzip, deflate en-US,en;q=0.5
-- So my question comes: since "LInux" and "X11" mark me unique among other ordinary users around me, could they be modified or spoofed manually? As I see Abrowser may did a good job that it hid the "abrowser" word while Iceweasel show itself in the User Agent.
--Could I modify other fingerprints ?
2. When I turn on my Abrowser, at the first few minutes, I observe the following active connectivities (while I had not opened any webpages yet):
Netid State Recv-Q Send-Q Local Address:Port Peer Address:Port
tcp SYN-SENT 0 1 192.168.1.107:33126 223.73.1.207:http
tcp CLOSING 1 1 192.168.1.107:55344 178.255.83.1:http
tcp SYN-SENT 0 1 192.168.1.107:33124 223.73.1.207:http
tcp ESTAB 0 0 192.168.1.107:49306 23.4.92.17:http
tcp ESTAB 0 0 192.168.1.107:57560 173.239.79.210:https
tcp ESTAB 0 0 192.168.1.107:47046 52.88.81.160:https
So what are these ip addresses?
Thanks a lot for answering!
"So what are these ip addresses?"
Ah, welcome to the lazyweb. I did a reverse DNS look up on them for you. From that, I am going to take a stab and guess that you have add-ons installed. Further, I'll take it one further and say that you have HTTPS Everywhere as one of them. And that furthermore it's configured to communicate with the EFF's SSL Observatory: https://www.eff.org/observatory
You can spoof the user-agent. There are many add-ons to do so: https://trisquel.info/en/browser/addons?keys=agent
I use Random Agent Spoofer: https://trisquel.info/en/browser/addons/random-agent-spoofer
Always fun to see what the browser is pushing out. Safari, Firefox, Internet Explorer - very cool add-on - one of the defaults for any of installs. Everyone should give it a try.
Thanks, jxself and Magic,
Right, thanks for reminding. I should just use \whois\ command.
Those Add-ons may trigger the same uniqueness that hackers can know that I use spoofers, jus the same as jxself knows I installed HTTPSeverywhere. :)
Anyway,forget fingerprint issue.
Here you can find useful information on privacy settings for your browser
https://www.privacytools.io/
- Vous devez vous identifier ou créer un compte pour écrire des commentaires