/TZP

TorZillaPrint: Firefox & Tor Browser fingerprint testing

Primary LanguageCSSMIT LicenseMIT

TorZillaPrint

TorZillaPrint (TZP) aims to provide a comprehensive, all-in-one, fingerprinting test suite, nicely broken into suitable sections with relevant information together. Long term, the goal is to collect fingerprint data (no PII, and from Firefox and Tor Browser only), so as to analyze that data to see how many classifications each metric or section provides

❗❗❗ DISCLAIMER ❗❗❗

TZP is NOT DESIGNED TO PROVIDE A STABLE FINGERPRINT to re-identify users on each visit. A fingerprint is simply a snapshot of data at any given time, and collected metrics can change for a number or reasons: such as zooming, resizing windows, moving windows, per site settings, etc. Snapshots of fingerprints can still be linked after the fact.

TZP aims to make sure Tor Browser and RFP are protecting metrics where known, and to dig into more areas of interest to determine equivalency or ppossible entropy. Non-stable metrics are collected to provide as much information as possible for analysis

🟪 What we do care about:

  • Current Tor Browser and Firefox ESR or higher
  • Tor Uplift, Fusion
  • Comparing Tor Browser with Firefox
  • First party only (for now)
  • Lowering entropy (or poison pills where appropriate)
  • Help. We'll take all the help we can get.

🟩 What we might care about:

  • Collecting data via submissions
  • Expanding to include tests that require third parties
  • Additional test pages for specific things

🟧 What we don't care about:

  • Other browsers
  • Extensions (except those used in Tor Browser if they affect tests)
  • Providing entropy figures

🟥 Acknowledgments

You know who you are. We don't need to list everyone. You're doing this to make the world a better place - that's your reward. And that's about it, for now. If you want to contribute with your amazing skills - come in and say hello.


version: draftv1.1
date: 9-Sept-2020