
WebRTC and Canvas
Re: WebRTC and Canvas
Let them spy... if you've up to nothing bad you've got nothing to hide 

Re: WebRTC and Canvas
Canvas fingerprinting
http://no-info.no-ip.info/canvas/
This is an image used to identify your with canvas fingerprinting
http://no-info.no-ip.info/canvas/
This is an image used to identify your with canvas fingerprinting
- oftentired
- Posts: 1769
- Joined: Tue May 13, 2014 3:14 am
Re: WebRTC and Canvas
I have to agree with dev, I don't see it as a problem and I don't see it as very intrusive.
-
- Posts: 12
- Joined: Sun May 17, 2015 6:35 pm
Re: WebRTC and Canvas
There is a chrome extension that's not in the store yet but you can download it from Github. It took my Panopticlick fingerprint from 1 in 6,000,000 to 1 in 2,600 essentially making me look like a few thousand other people out there.
https://github.com/ghostwords/chameleon/releases
https://github.com/ghostwords/chameleon/releases
Re: WebRTC and Canvas

Audio Context true
RTP-based Data Channels true
SCTP-based Data Channels true
PLEASE DISABLE :/
Re: WebRTC and Canvas
Don't worry about that. The goal is to prevent your IP address and unique device id from being leaks. The data channels are actually disabled as well. But the exported javascript interface is still available but not actually functioning. This web page only detects the existence of the javascript methods but doesn't verify whether it actually functions.
reactorr wrote:
Audio Context true
RTP-based Data Channels true
SCTP-based Data Channels true
PLEASE DISABLE :/
Stephen Cheng
FlashPeak Inc.
FlashPeak Inc.
Re: WebRTC and Canvas
Great!. thank you so much.flashpeak wrote:Don't worry about that. The goal is to prevent your IP address and unique device id from being leaks. The data channels are actually disabled as well. But the exported javascript interface is still available but not actually functioning. This web page only detects the existence of the javascript methods but doesn't verify whether it actually functions.
Re: WebRTC and Canvas
Chrome Stable Update
43.0.2357.130
High CVE-2015-1266: Scheme validation error in WebUI. Credit to anonymous.
High CVE-2015-1268: Cross-origin bypass in Blink. Credit to Mariusz Mlynski.
Medium CVE-2015-1267: Cross-origin bypass in Blink. Credit to anonymous.
Medium CVE-2015-1269: Normalization error in HSTS/HPKP preload list. Credit to Mike Ruddy.
http://googlechromereleases.blogspot.co ... pdate.html
43.0.2357.130
High CVE-2015-1266: Scheme validation error in WebUI. Credit to anonymous.
High CVE-2015-1268: Cross-origin bypass in Blink. Credit to Mariusz Mlynski.
Medium CVE-2015-1267: Cross-origin bypass in Blink. Credit to anonymous.
Medium CVE-2015-1269: Normalization error in HSTS/HPKP preload list. Credit to Mike Ruddy.
http://googlechromereleases.blogspot.co ... pdate.html