According to them, the new method makes it easier to track browsers, helps circumvent a number of anti-snooping techniques, and demonstrates that browser-based browsing extensions “allow more information to leak out than they can disguise.”
“Using browsers differences, we can deduce information about the system, both about the software as well as the hardware. As a result, we cannot only ease creation of fingerprints, but we gain the advantage of having a more precise picture for targeted exploitation”, — report researchers.
These variations allow finding out about environment-related properties in Chrome, Edge, Firefox and mobile version of Tor, with which anyone can become aware about the OS, processor, installed plug-ins to ensure privacy and version of browser.
The study of scientists once again shows that to ensure complete anonymity on the Web is quite difficult, even in the case of the Tor browser, developed for protection against surveillance. As explained by experts, implemented in Tor measures to mask digital footprint may be ineffective if you take into account additional data.
“We stress that ourmethod should be used in the development of browsers and pri-vacy extensions to automatically find flaws in the implementation”, – noted scientists from Austria.