LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 07-01-2015, 03:10 PM   #16
Sefyir
Member
 
Registered: Mar 2015
Distribution: Linux Mint
Posts: 634

Rep: Reputation: 316Reputation: 316Reputation: 316Reputation: 316

Quote:
Originally Posted by 273 View Post
I think than link may have been posted already.
My mistake. I read a few posts and completely missed yours!
 
Old 07-01-2015, 03:19 PM   #17
273
LQ Addict
 
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680

Rep: Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373
Quote:
Originally Posted by Sefyir View Post
My mistake. I read a few posts and completely missed yours!
You missed John VV's too...
 
Old 07-08-2015, 12:45 PM   #18
273
LQ Addict
 
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680

Rep: Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373
Quote:
Originally Posted by punchy71 View Post
Yes, I primarily use a web-browser on my PC. Interesting website link you provided. It seems to check for unique or rare browser configurations. I guess that's one way to lose your anonymity is to use a highly customized web-browser configuration or rare web browser itself.
Hmm, if I wanted to blend in with John Q. Public I guess I should dump Linux altogether and go back to use Internet Explorer in a bone stock configuration on MS Winblows, ... (?!)..
Coincidentally there is an article in this month's 2600 regarding this and I feel like an idoit for forgetting:
https://www.eff.org/privacybadger
If you don't already read 2600 then I would recomend taking a look at the online content at least.
http://www.2600.org/
 
Old 07-08-2015, 08:32 PM   #19
Sefyir
Member
 
Registered: Mar 2015
Distribution: Linux Mint
Posts: 634

Rep: Reputation: 316Reputation: 316Reputation: 316Reputation: 316
You don't need to use a highly customized one.
I use this:
https://github.com/dillbyrne/random-agent-spoofer

You can spoof any user-agent and it doesn't really get in the way (I will get random warnings every now and then about using a old version of IE and get confused before I remember I'm using it lol)
 
Old 07-09-2015, 01:08 AM   #20
273
LQ Addict
 
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680

Rep: Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373
Quote:
Originally Posted by Sefyir View Post
You don't need to use a highly customized one.
I use this:
https://github.com/dillbyrne/random-agent-spoofer

You can spoof any user-agent and it doesn't really get in the way (I will get random warnings every now and then about using a old version of IE and get confused before I remember I'm using it lol)
That only spoofs the user agent string though, which is only part of the battle. For that matter even the plugin I linked to doesn't prevent "browser fingerprinting" or IP address tracking.
 
Old 07-10-2015, 08:06 AM   #21
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,671
Blog Entries: 4

Rep: Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945
The only "real" way to identify a computer is to use an encrypted connection with unique digital certificates at both ends. Anyone who succeeds in establishing a connection must be in possession of a certificate that can be traced uniquely to him. The crypto transport further assures that the messages will be received as-tendered.

VPN, of course, is a de facto method of doing this, which also has the advantage of being transparent to both parties. If properly secured (i.e. "don't use PSKs == passwords"), the tunnel is reliable but invisible. It can be implemented in hardware.

Last edited by sundialsvcs; 07-10-2015 at 08:08 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
bypass internet censorship with different ways Mr.Drax Linux - Networking 15 12-19-2014 11:40 AM
Identifying mail sender's ip address brgsousa Linux - Software 1 10-15-2008 03:23 PM
identifying ip address of http user in postfix carlosuribe Linux - Security 1 04-29-2005 06:49 AM
Internet sites for identifying hardware? Thymox General 1 07-21-2002 05:00 AM
Should i use the eth0 ip address of my internet ip address when applying iptables ForumKid Linux - Security 2 01-03-2002 08:54 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:47 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration