Subject: Re: DHS et al: Mass Transit Audio Spies Date: Sun, 3 Jul 2016 17:16:07 -0700 From: Jason McVetta <[email protected]> To: cpunks <[email protected]>
> Those who have nothing to say, have nothing to fear. > > On Sun, Jul 3, 2016 at 11:45 AM, grarpamp <[email protected] > <mailto:[email protected]>> wrote: > > http://www.csoonline.com/article/3090502/security/big-brother-is-listening-as-well-as-watching.html > > https://audiofingerprint.openwpm.com/ This page tests browser-fingerprinting using the AudioContext and Canvas API. Using the AudioContext API to fingerprint does not collect sound played or recorded by your machine - an AudioContext fingerprint is a property of your machine's audio stack itself. If you choose to see your fingerprint, we will collect the fingerprint along with a randomly assigned identifier, your IP Address, and your User-Agent and store it in a private database so that we can analyze the effectiveness of the technique. We will not release the raw data publicly. A cookie will be set in your browser to help in our analysis. We also test a form of fingerprinting using Flash if you have Flash enabled. This page is a part of Princeton CITP's Web Transparency and Accountability Project. For questions or concerns email [email protected] and [email protected]
