I usually use Tor Browser to scan files online for viruses, which I then send to Windows users (I use Linux) if they are clean.
Lately, I’ve noticed that the User Agent in TOR is showing up as Linux, when it used to show up as Windows.
Is this a problem with my system or a change made by the TOR team? The fact that Linux has far fewer users increases fingerprinting.
Using TOR Browser, my user agent is:
Mozilla/5.0 (X11; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
… so I confirm that Windows is not spoofed now, if ever it were.
You can see what Web hosts see. Visit:
Tor scans for viruses?
That strikes me as an easy thing to miss; I would see the user agent string myself and let the project’s maintainers know about it
Does it increase fingerprinting? I imagine there might be some non-user-agent way to determine the OS. Like with image handling or whatever.
It’s probably more unique and suspicious for a linux browser to pretend to be Windows than a Linux system disclosing itself as Linux.
Pretty sure the TOR user agent is just default firefox, by design. It’s very easy to detect OS with very rudimentary fingerprinting techniques, a lot of which are blocked by the TOR browser but they can never get them all.