HACKLOG 1×15 – Il tuo Browser è sicuro? Test di Sicurezza del Browser e di Anonimato

All we talked about technologies
so far they have been analyzed in order It will demonstrate how each of them can become
a problem for the security of the browser. What we have not yet explained is
that the combination of these technologies form the so-called browser fingerprinting. The term fingerprinting (fingerprint)
we define that unique value that the browser It takes from the moment all its information
added lead to a single result. To be clear, imagine you are
can literally remove your browser. Each piece is part of a puzzle, and if this
puzzle has a single order in its structure, that’s automatically assumed identity
only; If this identity is associated to your person, there is no proxy / VPN / Tor
that can withstand. But what are these pieces you ask? You’ll be fascinated to know how much information
we release on the websites we visit. If you want, you can run a test on the site Panopticlick
developed by the EFF. Below you a screen monster with Opera
OSX 10.11.5 just formatted, the result It shows that on more than 13,000 test the browser
It is unique in its kind. If you have taken literally every single council
previous arguments likely Your browser is quite safe, however
you can do even more. The trick is to shuffle the cards, operation
possible manipulation of the above resources. Every browser allows you to make operations
a “cover-up” how to change the font list, disable plugins etc … yet
an entire book would not be enough to talk only this! We can, however, use some extensions
able to meet us, such as: FireGloves, available for Mozilla Firefox
StopFingerprinting, available to Google Chrome
A trick to confuse the fingerprinter It is to never use the browser
in full screen mode, otherwise the web server would be able to assess
the screen resolution, thus obtaining an adder for his research. This category includes all those files
that are downloaded, but which, once opened, can reveal the information of your
online data. If you need to open files
of any type it is good to use tools as a virtual machine on the host computer disconnected
from Internet. The downloaded files from the Internet may contain
executable code able to communicate externally the network in anonymity: eg with
right knowledge you can insert code arbitrary script in Word or PDF files as well
of course the classic executables available for your operating system (.exe, .dmg,
.sh and so on). The safety of the Browser is a subject very
complex and evolving that requires different knowledge in many areas. At present the most comprehensive and reliable tool
to perform a test of your browser – and its safety – is offered by
BrowserSPY that allows you to verify the existence, or rather the exposure of any technology
present in the browser. The use of this tool is particularly
simple: for each item left of the screen It will open a summary sheet covering
technology and a list of values ​​that are exposed on the network. Let’s make sure that all items that could
somehow undermine our anonymity They are properly hidden, deepening
maybe even those that were not treated in this document.

7 thoughts on “HACKLOG 1×15 – Il tuo Browser è sicuro? Test di Sicurezza del Browser e di Anonimato

Leave a Reply

Your email address will not be published. Required fields are marked *