Anonymous

April 06, 2019

Permalink

HTML5 Canvas Image Extraction and Fingerprinting

I know Tor's warning about (and blocking of) sites trying to extract html5 canvas image data is not a new thing but I remembered it just recently when the EU ratified article 13 which is likely to illegalize memes and whatever.
So I wanted to ask if the danger posed by HTML5 Canvas Image Extraction means that in extension any rendered/edited image can be traced back to the graphics card it was made with. The text here https://2019.www.torproject.org/projects/torbrowser/design/#fingerprint… states

'Subtle differences in the video card, font packs, and even font and graphics library versions allow the adversary to produce a stable, simple, high-entropy fingerprint of a computer. In fact, the hash of the rendered image can be used almost identically to a tracking cookie by the web server.'

That sounds pretty scary actually for anyone whoever uploaded an image, even he just shopped a line of text onto it

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

11 + 9 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.