Tor spoofOsInUserAgentHeader not working? : OpSec | Torhoo darknet markets
privacy.resistFingerprinting.spoofOsInUserAgentHeader = true
Still leaking the user-agent.
Tor is fully updated.
Tested multiple sites, same result.
Running on macOS.
Is this flag broken or just ignored now?
With Tor Browser 14.0a4, we have introduced the boolean preference privacy.resistFingerprinting.spoofOsInUserAgentHeader. When this pref is set to true (which is currently the default), Tor Browser will follow the previously described legacy behaviour. However, if you set this preference (accessible in about:config) to false, Tor Browser will never spoof the user agent and will report your operating system family (i.e. Windows, macOS, Linux, or Android) when requested. We are considering changing Tor Browser to make this the new default behaviour.
Ref: https://torhoo.cc/go.php?u=YUhSMGNITTZMeTlpYkc5bkxuUnZjbkJ5YjJwbFkzUXViM0puTDI1bGR5MWhiSEJvWVMxeVpXeGxZWE5sTFhSdmNpMWljbTkzYzJWeUxURTBNR0UwTHc9PQ==#
Which Tor Browser version do you test?
privacy.fingerprintingProtection
Is there an over-hardening concern here if I were to set to True? Does that cause somebody to stand out?