Table of Contents

About

Although you may have a proxy such as tor, there are still methods that allow websites to retrieve information from your computer. This namespace gathers information on how these methods work.

General Attack Vectors

While your browser HTTP requests may be coerced to run through a proxy, a Java applet or a Flash object, can just as well access your hardware and then transmit that information to a different port over TCP (or UDP, etc… why not). This bypasses Tor completely since Tor just does TCP. This is a more generalized form of CSS.

Index


web/data_mining.txt · Last modified: 2022/04/19 08:28 by 127.0.0.1

Access website using Tor Access website using i2p Wizardry and Steamworks PGP Key


For the contact, copyright, license, warranty and privacy terms for the usage of this website please see the contact, license, privacy, copyright.