I usually use Tor Browser to scan files online for viruses, which I then send to Windows users (I use Linux) if they are clean.

Lately, I’ve noticed that the User Agent in TOR is showing up as Linux, when it used to show up as Windows.

Is this a problem with my system or a change made by the TOR team? The fact that Linux has far fewer users increases fingerprinting.

  • CCRhode@lemmy.ml
    link
    fedilink
    arrow-up
    4
    ·
    10 hours ago

    Using TOR Browser, my user agent is:

    Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0

    … so I confirm that Windows is not spoofed now, if ever it were.

    You can see what Web hosts see. Visit:

  • eldavi@lemmy.ml
    link
    fedilink
    English
    arrow-up
    1
    ·
    14 hours ago

    That strikes me as an easy thing to miss; I would see the user agent string myself and let the project’s maintainers know about it

  • SavvyWolf@pawb.social
    link
    fedilink
    English
    arrow-up
    13
    ·
    1 day ago

    Does it increase fingerprinting? I imagine there might be some non-user-agent way to determine the OS. Like with image handling or whatever.

    It’s probably more unique and suspicious for a linux browser to pretend to be Windows than a Linux system disclosing itself as Linux.

    • Atemu@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      3 hours ago

      Like with image handling or whatever.

      I’d expect TOR browser to mitigate this. Canvas2D is disabled for instance and system fonts aren’t exposed.

      Most other things could be mitigated by making every platform use the same code paths for e.g. font rendering. It should be pretty damn hard to determine which OS it is when the userspace is the same. I don’t know whether TOR browser currently does this though.

    • themoonisacheese@sh.itjust.works
      link
      fedilink
      arrow-up
      11
      ·
      1 day ago

      Pretty sure the TOR user agent is just default firefox, by design. It’s very easy to detect OS with very rudimentary fingerprinting techniques, a lot of which are blocked by the TOR browser but they can never get them all.