Table of Contents


Although you may have a proxy such as tor, there are still methods that allow websites to retrieve information from your computer. This namespace gathers information on how these methods work.

General Attack Vectors

While your browser HTTP requests may be coerced to run through a proxy, a Java applet or a Flash object, can just as well access your hardware and then transmit that information to a different port over TCP (or UDP, etc... why not). This bypasses Tor completely since Tor just does TCP. This is a more generalized form of CSS.


web/data_mining.txt ยท Last modified: 2017/02/22 18:30 (external edit)

Access website using Tor

For the copyright, license, warranty and privacy terms for the usage of this website please see the license and privacy pages.