HACKLOG 1×15 – Il tuo Browser è sicuro? Test di Sicurezza del Browser e di Anonimato


All we talked about technologies
so far they have been analyzed in order
It will demonstrate how each of them can become
a problem for the security of the browser.
What we have not yet explained is
that the combination of these technologies form
the so-called browser fingerprinting.
The term fingerprinting (fingerprint)
we define that unique value that the browser
It takes from the moment all its information
added lead to a single result.
To be clear, imagine you are
can literally remove your
browser.
Each piece is part of a puzzle, and if this
puzzle has a single order in its structure,
that’s automatically assumed identity
only; If this identity is associated
to your person, there is no proxy / VPN / Tor
that can withstand.
But what are these pieces you ask?
You’ll be fascinated to know how much information
we release on the websites we visit.
If you want, you can run a test on the site Panopticlick
developed by the EFF.
Below you a screen monster with Opera
OSX 10.11.5 just formatted, the result
It shows that on more than 13,000 test the browser
It is unique in its kind.
If you have taken literally every single council
previous arguments likely
Your browser is quite safe, however
you can do even more.
The trick is to shuffle the cards, operation
possible manipulation of the above resources.
Every browser allows you to make operations
a “cover-up” how to change the
font list, disable plugins etc … yet
an entire book would not be enough to talk
only this!
We can, however, use some extensions
able to meet us, such as:
FireGloves, available for Mozilla Firefox
StopFingerprinting, available to Google
Chrome
A trick to confuse the fingerprinter
It is to never use the browser
in full screen mode, otherwise
the web server would be able to assess
the screen resolution, thus obtaining
an adder for his research.
This category includes all those files
that are downloaded, but which, once opened,
can reveal the information of your
online data.
If you need to open files
of any type it is good to use tools
as a virtual machine on the host computer disconnected
from Internet.
The downloaded files from the Internet may contain
executable code able to communicate externally
the network in anonymity: eg with
right knowledge you can insert code
arbitrary script in Word or PDF files as well
of course the classic executables available
for your operating system (.exe, .dmg,
.sh and so on).
The safety of the Browser is a subject very
complex and evolving that requires
different knowledge in many areas.
At present the most comprehensive and reliable tool
to perform a test of your browser
– and its safety – is offered by
BrowserSPY that allows you to verify the existence,
or rather the exposure of any technology
present in the browser.
The use of this tool is particularly
simple: for each item left of the screen
It will open a summary sheet covering
technology and a list of values ​​that are
exposed on the network.
Let’s make sure that all items that could
somehow undermine our anonymity
They are properly hidden, deepening
maybe even those that were not treated
in this document.

7 Replies to “HACKLOG 1×15 – Il tuo Browser è sicuro? Test di Sicurezza del Browser e di Anonimato”

Leave a Reply

Your email address will not be published. Required fields are marked *