News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Tor spoofOsInUserAgentHeader not working? : OpSec | Torhoo darknet markets

privacy.resistFingerprinting.spoofOsInUserAgentHeader = true
Still leaking the user-agent.
Tor is fully updated.
Tested multiple sites, same result.
Running on macOS.
Is this flag broken or just ignored now?
With Tor Browser 14.0a4, we have introduced the boolean preference privacy.resistFingerprinting.spoofOsInUserAgentHeader. When this pref is set to true (which is currently the default), Tor Browser will follow the previously described legacy behaviour. However, if you set this preference (accessible in about:config) to false, Tor Browser will never spoof the user agent and will report your operating system family (i.e. Windows, macOS, Linux, or Android) when requested. We are considering changing Tor Browser to make this the new default behaviour.


Ref: https://torhoo.cc/go.php?u=YUhSMGNITTZMeTlpYkc5bkxuUnZjbkJ5YjJwbFkzUXViM0puTDI1bGR5MWhiSEJvWVMxeVpXeGxZWE5sTFhSdmNpMWljbTkzYzJWeUxURTBNR0UwTHc9PQ==#

Which Tor Browser version do you test?
/u/gringo
1 points
20 hours ago*
I just noticed this was set to False. Which would have been the default:

privacy.fingerprintingProtection

Is there an over-hardening concern here if I were to set to True? Does that cause somebody to stand out?
/u/ThatOpSecGuy
1 points
14 hours ago
It works for me on newest Tor Browser.
/u/FreeSpeechMatters 🍼
1 points
10 hours ago
The code was removed by a fed Tor developer.