logoalt Hacker News

Cider9986yesterday at 4:22 AM2 repliesview on HN

Being fingerprinted across Tor is different from being deanonymized—it basically just "psuedonomizes" you. You now have an identifier. It is a significant threat, but it is not hard to "psuedonomize" someone based on stylometry and some of the people with the highest threat model—operating an illegal site, will be pseudonymous anyway.

Don't get your opsec advice from HN. Check whonix, qubes, grapheneos, kicksecure forums/wikis. Nihilist opsec, Privacyguides.


Replies

grumbelbart2yesterday at 6:44 AM

This fingerprint persists over private and non-private Firefox sessions until you restart Firefox. State actors might be able to connect your Google-login in FF window 1 with your tor session in FF private window 2.

show 2 replies
goodpointyesterday at 12:55 PM

No, fingerprinting is a synonym of deanonymization.