Please, don't track me.

I recently gave a talk about the “Dark Web” at the Technion. A big portion of the talk was dedicated to privacy / anonymity, and the forces who try to break it. During the talk, I was asked if one can be tracked when using TOR.

TL;DR: fingerprintjs2 easily breaks TOR anonymity.

In this post I’ll explain a bit about fingerprinting and how fingerprintjs2 was able to fingerprint me behind TOR. I’ll also outline my own do’s and don’ts when surfing the web.


Fingerprinting is a technique, outlined in a research paper by the EFF, of anonymously identifying a web browser with accuracy of up to 94%.

A few days ago, a friend introduced me to fingerprintjs2, the successor of…wait for it…fingerprintjs.

fingerprintjs2 utilizes many techniques to generate a unique hash of your browser. Currently, there are 26 unique sources, and the list is growing.

According to it’s creators, during a test period of 4 months, 89% of fingerprints were unique, and 20% of their users had more than one fingerprint.

Breaking anonymity

I was curious how good fingerprintjs2 performs, and decided to take it for a test run.

First, I injected the following snippet to the blogs header:

<script type="text/javascript" src=""></script>
    new Fingerprint2().get(function(result, components){
  console.log("fingerprintjs2 hash: %s", result);

Then I fire up TOR Browser and checked the generated fingerprintjs2 hash.

Afterwards, I created a new Tor Circuit with a new exit node, then checked the hash. I ran that test 10 times, and every time it gave me the same result.

Even though the test was manual, and there were very few test cases, the results are still intriguing.

Takeaways? It might sound obvious, but disabling javascript would render this test useless. It would also make your surfing experience horrible.

P.S: You probably wonder why Tor Browser doesn’t disable JavaScript by default. The answer is here.

What now?

You want to surf the web. Disabling JavaScript would make your surfing experience horrible, so disabling it is not an option.

So what can you do?

During my talk, I laid out my privacy do’s and don’ts when surfing the web. Here’s the gist of it:

  • Try to avoid surfing in non-secured sites, and always use secured endpoints when available. HTTPS Everywhere can help with that.
  • don’t shop at non-secured websites & prefer paying with PayPal instead of entering your credit card information.
  • Use a dedicated credit card when shopping online.
  • Avoid sharing your Geo-Location. I use Location Guard.
  • Use ad & tracker blockers such as Ghostery & uBlock Origin
  • Use cookie-managers to prevent unwanted websites from tracking you. I use Vanilla Cookie Manager.
  • Use different password for different websites. specifically, your e-mail, bank & PayPal accounts should have unique passwords.
  • Consider using password managers like KeePass.
  • Turn on 2-Step-Authentication where possible.

Do you have your own set of do’s and don’ts? Tell me!