Scoundrel's avatar
Scoundrel 5 months ago
I found an article on the topic. Essentially, browsers do not come packaged with their own low level internet browsing code. AKA the TCP/IP stack. Instead they rely on the operating system's built in features to connect to IP addresses. This code behaves differently between different browsers and so it results in an identifiable fingerprint. You can follow this link to see what it might look like: It sounds like this would be easy to solve. Just don't do that. Statically link OS independent TCP/IP code to package it with the Tor Browser and ignore the OS's version entirely. I'm not sure what the problem with this would be, but my guess is that this would require bypassing important OS security features like firewalls and network interface drivers. I imagine that most operating systems would take issue with random userspace programs doing that, and Tor doesn't want to run as an administrator. I haven't tried to write any web servers or web clients so I don't have any idea what is and isn't possible.