- Joined
- Sep 22, 2021
I hate that I can't react to messages on the Android Tor Browser, as hovering just tries to open it in a new tab. All I can do is 
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
You're supposed to use TOR in the default window size and not maximize or change it.Plug-ins change your browser fingerprint and let threat actors deanonymize you from other TB users. You could get away with uBlock origin since it's already integrated into TailsOS, but that's it.
I hate that I can't react to messages on the Android Tor Browser, as hovering just tries to open it in a new tab. All I can do is![]()
Yeah. Still worth noting incase anyone has some bootleg fixes though.Same, but this seems to be a issue with XenForo on mobile in general not just Tor.
Regardless of extensions, there's a very trivial attack vector where sites can see if you've been browsing KF. Just need to see if Null's font is stored in the RAM cache of your browser.
emphasis mineState Partitioning is a different approach to preventing cross-site tracking. Rather than block access to certain stateful APIs in a third-party context, Firefox provides embedded resources with a separate storage bucket for every top-level website. More specifically, Firefox double-keys all client-side state by the origin of the resource being loaded and by the top-level site. In most instances, the top-level site is the scheme and eTLD+1 of the top-level page being visited by the user.
doesn't the tor browser use a different size window anyway even when maximized for that reason?You're supposed to use TOR in the default window size and not maximize or change it.
![]()
Go full autismo and remember the IDs for the most important reactions, then change them in the URL. Been there done that.I hate that I can't react to messages on the Android Tor Browser, as hovering just tries to open it in a new tab. All I can do is![]()
Same here. With this you're basically trading in additional anonymity that comes with using Tor Browser (which is OK as long as you use it only for KF) for convenience (things like working Youtube links without Google fucking you in the ass with endless captchas, the ability to open KF on Tor right next to your clearnet links, etc.) and lower resource usage (compare running a whole separate browser to running a background service).I use a browser setup that thoroughly breaks all the Tor Project guidelines, but I believe is sufficient enough to access Kiwi Farms, a Clearnet website stuck on Tor due to networking level censorship where Tor is only used as a mean of completing the network circuit. The only drawbacks it has is that it's not as easy to create a new Tor circuit, besides that it integrates seamlessly in my everyday browsing.
I did something similar with the Mark Forums Read button by fucking around with the timestamp, so now everything is marked as read permanently.Go full autismo and remember the IDs for the most important reactions, then change them in the URL. Been there done that.
Oh. You're right. I had a proof of concept going in 2020 right before they added this. Looks like everything's separated now.I don't think that's possible, at least not with Tor Browser, due to:
The Tor project has been pozzed for nearly a decade. What remains unclear if this has actually compromised the codebase. I don't know enough about Tor development to make that determination.I really hope that this Xitter post isn‘t the foreshadowing of the total pozzification of Tor:
View attachment 5868264
That‘s not an April Fool‘s joke on my part.
Source: https://x.com/torproject/status/1774528151412236566 | Archive: https://archive.is/JM1ku
Textual analysis would take you down regardless.I feel how modern browsers work it's almost imposible to keep a unique fingerprint anyways. I solve this problem for myself by having a "private" browser connecting via a very specific connection in a network namespace that can't leak doing my private stuff in where I'm being careful about my real identity, and having a completely different browser with different profile via my home network connection I use for everything connected to my real identity. This is convenient (no privacy measures in the "normie" browser means shops/banks etc. not freaking out) and I think keeps me anonymous enough. Even more ideal would be to run the normie browser on a different computer with a different OS, but my threat model doesn't really have that requirement.