[PrivacyBadger] Is it possible to use Privacy Badger in passive mode?

Cooper Quintin cooperq at eff.org
Mon Feb 13 10:21:39 PST 2017


Even just making this change you would still be extremely
fingerprintable by even installing privacy badger in the tor browser.
There are a ton of other requests made and scripts loaded that would
change the nature of the tor browser. For this reason I *strongly*
discourage running privacy badger in conjunction with tor browser.

And like Alex said, this feature is too specific to add to privacy
badger but of course you are free to modify the code if you wish.

- Cooper

On 02/10/2017 12:48 AM, Alex Ristich via PrivacyBadger wrote:
> Hi Daniel,
> 
> This is an interesting idea, though perhaps a bit too specific as of yet
> to be added as a permanent option. I think the quickest way about this -
> assuming you're comfortable touching the Privacy Badger code itself - is
> changing every instance of "/return {cancel: true} /" to "/return
> {cancel: false} /". A quick check shows that there are only three
> instances of this, all of which are in src/webrequest.js.
> 
> One thing to keep in mind is that the results from Tor Browser might be
> a bit different than what you'd see in a regular browser depending on
> your relative privacy settings. In some regard, it might be better to
> disable the privacy preserving features of Tor Browser while running the
> test so that Privacy Badger can most effectively determine tracking via
> methods such as fingerprinting. You could also try running a couple of
> tests with varied settings and see if the results differ widely, though
> it really depends on how much time you have to put into this :)
> 
> If you have any additional questions or need a hand getting things
> sorted out, feel free to follow up!
> 
> Cheers,
> Alex
> 
> On Thu, Feb 9, 2017 at 11:26 PM Daniel Struck via PrivacyBadger
> <privacybadger at lists.eff.org <mailto:privacybadger at lists.eff.org>> wrote:
> 
>     Hello,
> 
> 
>     I am researching the possibility to use Privacy Badger as a means to
>     generate filter lists for tools like Pi-Hole or uBlock Origin.
>     Pi-Hole is particularly interesting as it covers the whole network
>     (Smart TV, IoT, ...).
> 
> 
>     This is the setup I am currently considering:
> 
>     - Install the Tor Browser and add the Privacy Badger & Random Walk
>     add-on.
>     - Let Random Walk surf the web randomly. www.reddit.com/r/random
>     <http://www.reddit.com/r/random> might be a good starting point.
>     - Export the data from Privacy Badger and transform it in a format
>     suitable for Pi-Hole or uBlock Origin.
> 
>     I am considering to use the Tor Browser due to two aspects:
> 
>     - Add noise to the Tor network. If only a handful people would use
>     PGP, Tor, ... they would be automatically highly suspicious.
> 
>     - Random Walk might hit by chance an illegal website I don't want to
>     be associated with.
> 
> 
>     To mitigate the risk of fingerprinting while using the Tor Browser I
>     would like to able to use Privacy Badger in passive mode. It would
>     only determine if a domain tracks you but would not block the
>     domain. Could this option be added to Privacy Badger?
> 
> 
>     Best Regards,
> 
>     Daniel
> 
> 
>     _______________________________________________
>     PrivacyBadger mailing list
>     PrivacyBadger at lists.eff.org <mailto:PrivacyBadger at lists.eff.org>
>     https://lists.eff.org/mailman/listinfo/privacybadger
> 
> 
> 
> _______________________________________________
> PrivacyBadger mailing list
> PrivacyBadger at lists.eff.org
> https://lists.eff.org/mailman/listinfo/privacybadger
> 


More information about the PrivacyBadger mailing list