• cipherpunk
      link
      fedilink
      arrow-up
      3
      ·
      5 years ago

      It’s javascript, so unless Signalapp takes special defensive actions, anything in javascript is possible. E.g. Google could get your internal LAN IP address even if you proxy your traffic through Tor – which can then be used as part of the fingerprint. Visit wtfismyip.com to see how that works.

      • AgreeableLandscape
        link
        fedilink
        arrow-up
        3
        arrow-down
        1
        ·
        edit-2
        5 years ago

        How useful is an internal Lan IP? I’d imagine for most people it’s just 192.168.something or 10.something. Though if you’re on IPv6 is it just the same was your public IP?

        • cipherpunk
          link
          fedilink
          arrow-up
          3
          ·
          5 years ago

          I choose a quite obscure LAN IP so it’s less trivial for someone who gets past the firewall to target a host. There are thousands of LAN subnets, so once you divide a non-unique fingerprint into thousands, it’s quite trivial to identify unique hosts, particularly if the traffic to a particular site is not in the thousands.

          Even running a browser add-on/extension is sufficient to alter a fingerprint to be more unique.