So, you want to harden Tor. : Guides | Torhoo darknet markets
This list gets updated at least once a month.
Based on:
•
Evaluating Anti-Fingerprinting Privacy Enhancing Technologies
https://dl.acm.org/doi/pdf/10.1145/3308558.3313703
•
The Elephant in the Background: A Quantitative Approach to Empower Users Against Web Browser Fingerprinting
https://fpmon.github.io/fingerprinting-monitor/files/FPMON.pdf
•
Web Browser Privacy: What Do Browsers Say When They Phone Home?
https://www.scss.tcd.ie/Doug.Leith/pubs/browser_privacy.pdf
_____________________________________________________________________
So, you want to harden Tor.
One thing you need to understand is that
the goal of Tor is to make everybody look like everyone else.
That’s the countermeasure; to blend in and not stick out.
You can harden Tor and disable tracking features but you have to keep a balance to mesh into the tapestry and not be uniquely identifiable; not leave behind a fingerprint so unique it identifies you.
Here are some good habits:
1st --- Always verify the digital signature of your Tor download using the provided .asc file to make sure it is authentic and untampered with. This is similar to verifying Onion URLs and signatures.
2nd --- Always
update Tor before using Tor.
3rd --- Get familiar with “
about:config” — you type ‘this’ into the URL bar.
Most importantly, use Tor as a Tool --- use .onion services where possible to stay within the Tor network; avoid the exit node.
Here are some changes you can make. Some of these options may disappear with newer releases of Firefox, but the idea is the same—avoid being easily tracked. Each change can always be undone.
(Note: there are *fake* Tor websites out there.)
javascript.enabled | false |
browser.urlbar.filter.javascript | false |
geo.enabled | false |
media.getusermedia.screensharing.enabled | false |
media.getusermedia.audiocapture.enabled | false |
media.peerconnection.enabled | false |
network.http.sendSecureXSiteReferrer | false |
webgl.disabled | true |
webgl.enable-webgl2 | false |
browser.send_pings | false |
toolkit.telemetry.enabled | false |
network.captive-portal-service.enabled | false |
browser.sessionstore.warnOnQuit | true |
browser.aboutConfig.showWarning | false |
browser.warnOnQuit | true |
browser.tabs.closeWindowWithLastTab | false |
IMO these should be default settings on a fresh install, but with Tor browser trying to appeal to a larger audience I can somewhat understand their reasons to have things setup this way.