Delivery-Date: Fri, 28 Aug 2015 22:17:53 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD,UNPARSEABLE_RELAY
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 776A41E0D35;
	Fri, 28 Aug 2015 22:17:51 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id AB40F37239;
	Sat, 29 Aug 2015 02:17:44 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 1257437218
 for <tor-talk@lists.torproject.org>; Sat, 29 Aug 2015 02:17:41 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id USIuicdiiXan for <tor-talk@lists.torproject.org>;
 Sat, 29 Aug 2015 02:17:41 +0000 (UTC)
Received: from npomail1.electricembers.net (mail.electricembers.net
 [208.90.215.73])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "*.electricembers.net",
 Issuer "RapidSSL SHA256 CA - G3" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id E441B37212
 for <tor-talk@lists.torproject.org>; Sat, 29 Aug 2015 02:17:37 +0000 (UTC)
Received: from private by npomail1.electricembers.net;
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=freedom.press; s=mail;
 t=1440814655; bh=J4L+x/vMfVKDRv4300qBXg1MhMjoohj1A447whwOTsc=;
 l=735; h=Subject:To:From:MIME-Version:Content-Type:
 Content-Transfer-Encoding;
 b=wAFq21KUcepIJ5uBfjypKkOi0b9DRJX1CTBro+cv7P0333FlLBn3ypmhsrXZWbZGJ
 CIzfU2spZ0CCF0lVyXrlgmQgafVdtU+UdVDee9TW0ZoTJ1l4BCUGzynTkl8ejFilTd
 gxnY3nnCCSQlPO2YufXHTCuRsHyrapL0jkiGtf58pT85wf3v3rTbAAO2fb+D0wQU7l
 8DpZnCbrztEO8vixbBMV2DqNI73h+5FZF/wUl5KiqtPvpQAZSuqlVUOAeFeUJljcVO
 e2V/nGWi4Frwib3fTz/WyPrIHfjqoVDuTXR2AsA47zgqYGU4i1owIq58zIVXy17MgV
 8VQzwSnOmKrQQ==
To: tor-talk@lists.torproject.org
References: <20150828230041.747D340496@smtp03.mail.de>
 <20150829020151.GG5822@torproject.org>
From: Garrett Robinson <garrett@freedom.press>
Message-ID: <55E1163E.3050506@freedom.press>
Date: Fri, 28 Aug 2015 19:17:34 -0700
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:38.0)
 Gecko/20100101 Thunderbird/38.2.0
MIME-Version: 1.0
In-Reply-To: <20150829020151.GG5822@torproject.org>
Subject: Re: [tor-talk] Privacy Badger
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On 8/28/15 7:01 PM, Mike Perry wrote:
> sg.info@email-postfach.info:
>> Hi guys and girls,
>> are there security issues using the privacy badger from eff.org with the tor browser ? 
>> Or: Is there are a need to use privacy badger or is this utility dispensable ?
> 
> The filters in use by Privacy Badger are fingerprintable - it is
> possible for sites to determine that you have it installed.

Since Privacy Badger uses a learning heuristic based on the sites you
visit, it actually might possible for it to leak information about your
browsing history too.

In general, does Tor Browser persist the state saved by extensions
across restarts, or is that wiped along with the history and cookies and
everything else?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

