-
Notifications
You must be signed in to change notification settings - Fork 0
/
Comparison_with_Others.mw
1720 lines (1440 loc) · 78.1 KB
/
Comparison_with_Others.mw
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
{{Header}}
{{Title|title=
Anonymity Operating System Comparison - {{project_name_short}} vs Tails vs Tor Browser Bundle
}}
{{#seo:
|description=Comparison of {{project_name_long}}, Tails, Tor Browser Bundle, QubesOS TorVM and corridor. About anonymity, privacy, security, circumvention, attacks, fingerprinting, usability, features, etc.
|image=Balance-154516-640.png
}}
{{tech_intro_mininav}}
[[File:Balance-154516-640.png|thumb]]
{{intro|
This page contains a detailed comparison of {{project_name_short}}, Tails, Tor Browser, Qubes OS TorVM and corridor.
}}
= Introduction =
Although Qubes' TorVM -- a dedicated ProxyVM providing torified networking to all clients -- is [https://www.qubes-os.org/doc/external/privacy-guides/torvm/ now deprecated], it has been kept for comparison purposes since it acted like {{project_name_gateway_long}} (<code>{{project_name_gateway_vm}}</code>). <ref>
The Qubes website states:
<blockquote>
If you are interested in TorVM, you will find the {{project_name_short}} implementation in Qubes a more usable and robust solution for creating a torifying traffic proxy.
</blockquote>
</ref>
If any incorrect or outdated information is noted, the reader can either directly edit this page, or [[contact]] us and we will correct it as soon as possible. Also see the [[#Statement about Neutrality of this Page|statement about the neutrality of this page]].
= Last Update =
'''Table:''' ''Comparison Information Currency''
{| class="wikitable" style="text-align: center"
!
! '''[[About|{{project_name_short}}]] || style="width:125px"| '''[https://tails.boum.org/ Tails]''' || style="width:125px"| '''[https://www.torproject.org/ Tor Browser]''' || style="width:125px"| '''[https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/torvm.md Qubes OS TorVM]''' || style="width:125px"| '''[https://github.com/rustybird/corridor corridor]''' ([https://lists.torproject.org/pipermail/tor-talk/2014-February/032152.html tor-talk])
|-
! Compared Version <ref>At the time of last comparison.</ref>
| style="background-color: {{Green}}"| 16.0.3.7
| style="background-color: {{Green}}"| 2.4
| style="background-color: {{Green}}"| 6.0
| style="background-color: {{Green}}"| 0.1.3
| style="background-color: {{Green}}"| ?
|-
! Latest Version <ref>Most recent stable version.</ref>
| style="background-color: {{Green}}"| {{VersionNew}}
| style="background-color: {{Green}}"| 5.16.1
| style="background-color: {{Green}}"| 12.5.2
| style="background-color: {{Green}}"| 0.1.3
| style="background-color: {{Green}}"| ?
|-
! Status
| style="background-color: {{Green}}"| This wiki page is up to date
| style="background-color: {{Green}}"| This wiki page is up to date
| style="background-color: {{Green}}"| This wiki page is up to date
| style="background-color: {{Green}}"| This wiki page is up to date
| style="background-color: {{Green}}"| This wiki page is up to date
|-
|}
= General =
'''Table:''' ''General Factors''
{| class="wikitable" style="text-align: center;
|-
!
! '''{{project_name_short}}'''
! '''Tails'''
! '''Tor Browser'''
! '''Qubes OS TorVM'''
! '''corridor'''
|-
! Focus on anonymity, privacy and security
|{{Yes}}
|{{Yes}}
|{{Yes}}
|{{Yes}}
|{{Yes}}
|-
! Type
| General purpose OS available as VM images and physical isolation
| Live DVD / Live USB / Live SDCard
| Portable browser
| General purpose OS, VM plugin for Qubes OS
| Tor traffic whitelisting gateway
|-
! Supported hardware
| x86 compatible and/or Virtual Machines + <ref>[[Other Operating Systems|Custom-Workstation]]: self-made builds can run on any real or virtual hardware so long as they are behind a {{project_name_gateway_short}} (<code>{{project_name_gateway_vm}}</code>). Tor Browser binaries are limited to a handful of platforms - Windows, Linux, BSD and Mac.</ref>
| x86 compatible and/or Virtual Machines
| Windows, Linux, Mac and Virtual Machines
| Any capable of running Qubes OS, see: [https://www.qubes-os.org/doc/system-requirements/ System Requirements] and [https://www.qubes-os.org/hcl/ HCL]
| Any Linux (?)
|-
! Based on
| Tor, Debian <ref>{{project_name_workstation_long}} (<code>{{project_name_workstation_template}}</code>): [[Other Operating Systems]] are also supported. With respect to {{project_name_gateway_short}} (<code>{{project_name_gateway_template}}</code>), developers are agnostic about supporting any other secure distributions. Of course another operating system could be used as the base, but it requires significant effort.</ref> and a Virtualizer <ref name=virtual>The default downloads are for VirtualBox, but this is subject to change in the future. [[Dev/Build_Documentation/Physical_Isolation|Physical Isolation]] is an optional security feature for advanced users. Experimental, optional support is available for [[VMware]]. Images can be built for other virtualizers, but it requires some work, see: [[Dev/Other_Virtualization_Platforms|Other Virtualization Platforms]].</ref> when not using Physical Isolation
| Tor, Debian
| Tor, Firefox
| Tor, Qubes OS, Fedora
| iptables, sh
|-
! Gateway and torify any operating system <ref>For advanced users.</ref>
|{{Yes}} <ref>See [[Other Operating Systems]].</ref>
| {{BlueBackground}} Not a torifying Gateway
| {{BlueBackground}} Not a torifying Gateway
| {{Yes}} <ref>See also [https://www.qubes-os.org/doc/standalones-and-hvms/ HVM].</ref>
| {{BlueBackground}} Not a torifying Gateway
|-
! Live Mode
| style="background-color: {{Green}}"| [[VM_Live_Mode|Yes]] <ref>[[Qubes|{{q_project_name_long}}]]: [[Qubes/Disposables|Disposables]]</ref>
|{{Yes}}
|{{No}}
|{{No}}
|{{No}}
|-
! Live DVD
|{{No}}
|{{Yes}}
|{{No}}
|{{No}}
|{{No}}
|-
! Live USB
|{{No}}
|{{Yes}}
|{{No}}
|{{No}}
|{{No}}
|-
! USB bootable
| style="background-color: {{Yellow}}"| Yes <ref name=boot>Users can install the host operating system on a USB.</ref>
| {{Yes}}
| style="background-color: {{Yellow}}"| Yes <ref name=boot />
| style="background-color: {{Yellow}}"| Yes <ref name=boot />
| style="background-color: {{Yellow}}"| Yes <ref name=boot />
|-
! USB installer feature
| {{No}} <ref>{{project_name_short}} does not have a fully-featured USB installer. Installing the operating system on a USB is recommended, but the decision is left to the user.</ref>
| {{Yes}} <ref>Tails has a professional USB installer.</ref>
| ?
| {{Yes}}
| {{No}}
|-
! Requires VirtualBox <ref name=vmneutralcolor>This has a neutral blue color, because the project dictates whether or not a specific virtualizer is required.</ref>
| {{BlueBackground}} No
| {{BlueBackground}} No
| {{BlueBackground}} No
| {{BlueBackground}} No
| {{BlueBackground}} No
|-
! Requires VMware <ref name=vmneutralcolor />
| {{BlueBackground}} No
| {{BlueBackground}} No
| {{BlueBackground}} No
| {{BlueBackground}} No
| {{BlueBackground}} No
|-
! Requires Qubes OS <ref name=vmneutralcolor />
| {{BlueBackground}} No
| {{BlueBackground}} No
| {{BlueBackground}} No
| {{BlueBackground}} Yes
| {{BlueBackground}} No
|-
! System requirements
| style="background-color: {{Yellow}}"| Higher
| style="background-color: {{Green}}"| Lower
| style="background-color: {{Green}}"| Lowest
| style="background-color: {{Yellow}}"| Highest
| style="background-color: {{Green}}"| Lowest
|-
! Can run in VirtualBox
| {{Yes}}
|style="background-color: {{Yellow}}"| Yes, but not recommended. <ref name=tailswarnvm>https://tails.boum.org/contribute/design/virtualization_support/</ref> Well documented <ref name=tailsdocvm>https://tails.boum.org/doc/advanced_topics/virtualization/</ref>
| Yes, but (?)
| style="background-color: {{Red}}"| No <ref name=qubesosinvirtualbox>This has a red color because it raises the bar for new users, who must expend significant effort to try it.</ref>
| {{No}}
|-
! Can run in VMware
| style="background-color: {{Yellow}}"| Yes, but not recommended and unsupported <ref>This is only available as an experimental proof of concept, see: [[VMware]]. It is not recommended because VMware is closed source software. {{project_name_short}} developers do not support or [[Essential_Tests|test]] this configuration.</ref>
| style="background-color: {{Yellow}}"| Yes, but not recommended <ref name=tailswarnvm />
| Yes, but (?)
| {{BlueBackground}} No <ref name=qubesosinvmware>This has a neutral color because Qubes OS is open source, while VMware is closed source and should therefore be discouraged.</ref>
| {{No}}
|-
! Can run in Qubes OS
| {{Yes}} <ref>[[Qubes|{{q_project_name_short}}]].</ref>
| {{Yes}} <ref>https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/tails.md</ref>
| style="background-color: {{Yellow}}"| Probably yes, but without security features provided by an [https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TorifyHOWTO/IsolatingProxy Isolating Proxy]
| {{Yes}}
| {{Yes}}
|-
! Persistence <ref>Custom installed applications and user data can be stored and survive reboot.</ref>
| style="background-color: {{Green}}"| Full
| style="background-color: {{Green}}"| Optional for Live USB
|{{Yes}} <ref>Depending on a user's settings, bookmarks and passwords can be saved, and downloaded files retained.</ref>
| style="background-color: {{Green}}"| Full
| style="background-color: {{Green}}"| Full
|-
! Number of developers
| Multiple <ref>See [[Contributors]].</ref>
| Multiple
| Multiple
| Multiple
| One
|-
! Maturity
| Project since 2012
| Project since 2009 <ref>https://en.wikipedia.org/wiki/Tails_%28operating_system%29</ref>
| Project since 2002 <ref>https://en.wikipedia.org/wiki/Tor_browser</ref>
| Project since 2012 (now deprecated)
| Project since 2014
|-
! Open source
|{{Yes}}
|{{Yes}}
|{{Yes}}
|{{Yes}}
|{{Yes}}
|-
! Non-anonymous developers <ref>This matters because until {{Code2|Deterministic Builds}} become standard, (non-)anonymous developers might imply trust. A project's reputation, formal education and expertise are other relevant factors.</ref>
|{{Yes}}
|{{No}}
|{{Yes}}
|{{Yes}}
|{{No}} (?)
|-
|}
= Security =
== Network ==
'''Table:''' ''Network Security''
{| class="wikitable" style="text-align: center;"
|-
!
! '''{{project_name_short}}'''
! '''Tails'''
! '''Tor Browser'''
! '''Qubes OS TorVM'''
! '''corridor'''
|-
! Responsibility for building Tor circuits
| Tor client running on {{project_name_gateway_short}}
| Tor client running on workstation
| Tor client running on workstation
| Tor client running on TorVM (Gateway)
| Tor client running behind corridor-Gateway
|-
! Protection against IP address / location discovery <ref name=rootexploits>Protection from root exploits, specifically [https://en.wikipedia.org/wiki/Malware malware] with root rights.</ref> on the Workstation <ref name=workstation>The Workstation is where the browser, IRC client and other user applications are run. The Gateway is where Tor and the firewall are running.</ref>
| {{Yes}} <ref>{{Anchor|protection}}{{project_name_short}} protects against IP address / location discovery through root exploits ([https://en.wikipedia.org/wiki/Malware malware] with root rights) inside {{project_name_workstation_short}} (<code>{{project_name_workstation_vm}}</code>), although this feature should not be unnecessarily tested. Successful attacks by adversaries cannot yield the user's real IP address / location, because {{project_name_workstation_short}} (<code>{{project_name_workstation_vm}}</code>) can only connect through the {{project_name_gateway_short}} (<code>{{project_name_gateway_vm}}</code>). More skill is required to compromise {{project_name_short}} due to its [[Design|design]]; also see [[#Attacks|attacks on {{project_name_short}}]].</ref>
| {{No}} <ref name=realip>If Tails is compromised by a root exploit, the adversary can simply bypass the firewall to discover the user's real IP address.</ref>
| {{No}} <ref name=realip />
| {{Yes}}
| {{No}} <ref name>corridor is not designed for that purpose. A compromised application could contact a colluding Tor relay.</ref>
|-
! IP / DNS protocol leak protection
| style="background-color: {{Green}}"| Full <ref>IP / DNS leaks are [[#protection|impossible]] in {{project_name_short}}, since {{project_name_workstation_short}} (<code>{{project_name_workstation_vm}}</code>) is unaware of its external IP address.</ref>
| style="background-color: {{Yellow}}"| Depends <ref name=ipleak>Please read how {{project_name_short}} [[Whonix against Real Attacks|protects against realistic threats]] first. IP leaks are possible in Tails if applications are configured incorrectly or have a critical bug - this similarly applies to the Tails platform itself. The [https://tails.boum.org/security/index.en.html Tails Security Page] notes: <blockquote>Until an [https://gitlab.tails.boum.org/tails/tails/-/issues/5769 audit] of the bundled network applications is done, information leakages at the protocol level should be considered as - at the very least - possible.</blockquote></ref>
| style="background-color: {{Yellow}}"| Depends <ref name=ipleak />
| style="background-color: {{Green}}"| Full
| style="background-color: {{Yellow}}"| Depends
|-
! No need for the Workstation to trust the Gateway
| {{Yes}}
| {{BlueBackground}} Not a gateway
| {{BlueBackground}} Not a gateway
| {{Yes}}
| {{No}}
|-
! Takes advantage of entry guards <ref>https://support.torproject.org/#about_entry-guards</ref>
| {{Yes}}
| {{No}} <ref>https://gitlab.tails.boum.org/tails/blueprints/-/wikis/persistent_Tor_state/</ref>
| {{Yes}}
| {{Yes}}
| {{BlueBackground}} Not applicable <ref name=uptotheclienttobuildtorcircuits />
|-
! Takes advantage of [https://github.com/mikeperry-tor/vanguards vanguards], which protects against guard discovery and related traffic analysis attacks and fixes [https://nvd.nist.gov/vuln/detail/CVE-2020-8516 CVE-2020-8516 Hidden Service deanonymization].
| {{No}} <ref>[[vanguards]]</ref>
| {{No}} <ref>Similar to above because it requires persistent Tor entry guards.</ref>
| {{No}}
| {{No}}
| {{BlueBackground}} Not applicable <ref name=uptotheclienttobuildtorcircuits />
|-
|}
== Stream Isolation ==
'''Table:''' ''Stream Isolation''
{| class="wikitable" style="text-align: center;"
|-
!
! '''{{project_name_short}}'''
! '''Tails'''
! '''Tor Browser'''
! '''Qubes OS TorVM'''
! '''corridor'''
|-
! Stream isolation <ref>Stream isolation provides protection against identity correlation through circuit sharing.</ref>
| {{Yes}} <ref>For further details, see [[Stream Isolation|stream isolation]].</ref>
| {{Yes}} <ref>[https://gitlab.tails.boum.org/tails/tails/-/issues/5334 Separate Tor streams in Tails].</ref>
| {{Yes}} <ref name=browser>Ever since the following ticket was implemented: [https://gitlab.torproject.org/legacy/trac/-/issues/3455 Tor Browser should set SOCKS username for a request based on referer].</ref> <ref>Tor Browser comes with its own Tor instance. It is just a browser, not a live system or an operating system.</ref>
| Manually <ref>The user must configure applications manually to use stream isolation. In {{project_name_short}}, all applications that are installed by default (like curl, wget, ssh, tbb, and others) are configured to use their own SocksPort. Tails also has this feature, but it is not as extensive as {{project_name_short}}. When QubesOS TorVM was last checked, it did not provide stream isolation.</ref>
| {{Yes}}
|-
! Enforces stream isolation when one of X Workstations behind the same Gateway is compromised in the default configuration <ref name=xworkstations>This is relevant when workstations x1, x2, ..., xn are all running behind the same gateway y.</ref>
|
* [[Qubes|{{q_project_name_short}}]]: {{Yes_text}} <ref>See: [[Dev/Qubes#IP_Spoofing_Protection|IP spoofing protection]].</ref>
* [[Non-Qubes-Whonix|{{non_q_project_name_short}}]]: <span style="background:{{Yellow}}">Optional</span> <ref>A user can either run [[Multiple_{{project_name_gateway_short}}|Multiple {{project_name_gateway_short}}]] or configure an [[Connections between Gateway and Workstation|encrypted and/or authenticated connection between the {{project_name_gateway_short}} and {{project_name_workstation_short}}]].</ref>
| {{BlueBackground}} Not a gateway
| {{BlueBackground}} Not a gateway
| {{Yes}} <ref>See: https://groups.google.com/d/msg/qubes-devel/le7-Rrq6yxY/k_fQdSTzvLAJ</ref>
| {{Yes}} <ref name=uptotheclienttobuildtorcircuits>Since the responsibility for building Tor circuits falls on clients running behind corridor-Gateway.</ref>
|-
! Stream isolation in Tor Browser
| {{Yes}}
| {{Yes}}
| {{Yes}}
| ?
| ?
|-
|}
== Updates ==
'''Table:''' ''Updates''
{| class="wikitable" style="text-align: center;"
|-
!
! '''{{project_name_short}}'''
! '''Tails'''
! '''Tor Browser'''
! '''Qubes OS TorVM'''
! '''corridor'''
|-
! Operating system updates
| style="background-color: {{Green}}"| Persist once updated
| style="background-color: {{Green}}"| Incremental upgrades <ref>See https://tails.boum.org/contribute/design/upgrades/#index5h3</ref>
| style="background-color: {{Green}}"| Persist once updated
| style="background-color: {{Green}}"| Persist once updated
| style="background-color: {{Green}}"| Persist once updated
|-
! Update notifications
| {{Yes}} <ref>See [https://www.kicksecure.com/wiki/Systemcheck systemcheck], [[Stay_Tuned#{{project_name_short}}_News|{{project_name_short}} news]].</ref>
| {{Yes}}
| {{Yes}}
| {{Yes}}
| ?
|-
! Important news notifications
| {{Yes}} <ref>See [[Stay_Tuned#{{project_name_short}}_News|{{project_name_short}} news]].</ref>
| {{Yes}} <ref> A GNOME <code>libnotify</code> notification pops up with a link and offers the user an opportunity to subscribe to news by email.</ref>
| ? <ref>This might be possible via the browser's https://check.torproject.org function. This was never implemented, even after [https://blog.torproject.org/tor-security-advisory-old-tor-browser-bundles-vulnerable/ old Tor Browser bundles became a popular exploit].</ref>
| ?
| ?
|-
! APT unreliable exit code security workaround <ref name=Security_Issues_when_using_apt-get_update_in_Scripts>See [[Dev/Automatic_Updates#Security_Issues_when_using_apt-get_update_in_Scripts|security issues when using apt update in scripts]].</ref>
| {{Yes}} <ref>The [https://www.kicksecure.com/wiki/Systemcheck systemcheck] function [https://github.com/Kicksecure/systemcheck/blob/master/usr/libexec/systemcheck/check_operating_system.bsh check_operating_system] uses [https://github.com/Kicksecure/security-misc/blob/master/usr/libexec/security-misc/apt-get-update ''/usr/libexec/security-misc/apt-get-update''].</ref>
| ?
| ?
| ?
| ?
|-
|}
== Hardware Serials ==
'''Table:''' ''Hardware Serials''
{| class="wikitable" style="text-align: center;"
|-
!
! '''{{project_name_short}}'''
! '''Tails'''
! '''Tor Browser'''
! '''Qubes OS TorVM'''
! '''corridor'''
|-
! Hides hardware serials from malicious software with default settings
| {{Yes}} <ref>See [[Protocol-Leak-Protection and Fingerprinting-Protection]] for details.</ref>
| {{No}} <ref name=malware>By default this information is not sent to anyone. It is only at risk when the machine is compromised by malware.</ref>
| {{No}} <ref name=malware />
| {{Yes}}
| {{No}} <ref name=malware />
|-
! Hides hardware serials from malicious software when additional hardware is assigned
| {{No}}
| {{No}}
| {{No}}
| {{No}}
| {{No}}
|-
! No collection of hardware serials
| style="background-color: {{Green}}"| Yes
| style="background-color: {{Green}}"| Yes
| style="background-color: {{Green}}"| Yes
| style="background-color: {{Green}}"| Yes
| style="background-color: {{Green}}"| Yes
|-
! Hides the MAC address from websites
| {{BlueBackground}} Invalid <ref name=invalid>The design of assigned MAC addresses means that destination servers cannot see them. Therefore yes, they are always hidden from destination servers.</ref>
| {{BlueBackground}} Invalid <ref name=invalid />
| {{BlueBackground}} Invalid <ref name=invalid />
| {{BlueBackground}} Invalid <ref name=invalid />
| {{BlueBackground}} Invalid <ref name=invalid />
|-
! Hides the MAC address from the local LAN <ref>This is a realistic threat considering some ISPs are based on LANs, which means they can see the MAC addresses of their clients. Hotspots can also see the MAC addresses of connected devices.</ref>
| style="background-color: {{Red}}"| No, see footnote <ref>Please read [[MAC_Address|{{project_name_short}} in public networks / MAC Address]].</ref>
| {{Yes}} <ref>Tails spoofs the MAC address. This feature can be easily disabled.</ref>
| {{No}}
| style="background-color: {{Yellow}}" | Yes, but not enabled by default <ref>https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/anonymizing-your-mac-address.md</ref>
| {{BlueBackground}} Not applicable
|-
! Hides the MAC address from applications
| {{Yes}} <ref>The virtual MAC address for {{project_name_gateway_short}} internal network interface (<code>eth1</code>) is shared among all {{project_name_short}} users, because {{project_name_workstation_short}} can see it. However, {{project_name_workstation_short}} cannot see the MAC address of {{project_name_gateway_short}} external network cards (<code>eth0</code>).</ref>
| {{No}}
| {{No}}
| {{Yes}}, by default, unless... <ref>Unless a physical network card is assigned to the virtual machine.</ref>
| {{BlueBackground}} Not applicable
|-
! Defeats advanced Wi-Fi device tracking <ref>[https://papers.mathyvanhoef.com/asiaccs2016.pdf Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms]</ref> <ref>[https://web.archive.org/web/20151011055119/http://www2.ece.gatech.edu/cap/papers/1569740227-3.pdf A Passive Technique for Fingerprinting Wireless Devices with Wired-side Observation]</ref>
| {{No}} <ref>https://forums.whonix.org/t/your-mac-address-randomization-attempts-are-futile</ref> <ref>
[[MAC_Address#Introduction|MAC Address Introduction]]</ref>
| {{No}}
| {{No}}
| {{No}} <ref>https://github.com/QubesOS/qubes-issues/issues/2361</ref>
| {{BlueBackground}} Not applicable
|-
|}
== Forensics ==
'''Table:''' ''Forensic Issues''
{| class="wikitable" style="text-align: center;"
|-
!
! '''{{project_name_short}}'''
! '''Tails'''
! '''Tor Browser'''
! '''Qubes OS TorVM'''
! '''corridor'''
|-
! Amnesic
|
* [[Qubes|{{q_project_name_short}}]]: {{No_text}} <ref>[[Qubes/Disposables#Warnings|Disposables are not amnesic]].</ref>
* [[Non-Qubes-Whonix|{{non_q_project_name_short}}]]: Optional [[Live Mode]].
| {{Yes}} <ref>Tails is amnesic by design.</ref>
| {{No}} <ref>Although Tor Browser [https://2019.www.torproject.org/projects/torbrowser/design/#Implementation is designed] to prevent browser activity leaking to disk, the implementation could be faulty, or swap might still leak. Also see The Tor Project blog post [https://blog.torproject.org/forensic-analysis-tor-linux/ Forensic Analysis of Tor on Linux] and the [https://research.torproject.org/techreports/tbb-forensic-analysis-2013-06-28.pdf full pdf results].</ref>
| ? <ref>A [https://www.qubes-os.org/doc/how-to-use-disposables/ Disposable] could be used with a TorVM. For a discussion of TorVM anti-forensics features, see [https://groups.google.com/g/qubes-devel/c/QwL5PjqPs-4 Disposable versus local forensics?].</ref>
| {{BlueBackground}} Not applicable <ref>corridor-Gateway itself is not amnesic. The amnesic feature must be implemented by the workstations (and possibly gateways) behind corridor-Gateway.</ref>
|-
! Local disk encryption
| style="background-color: {{Yellow}}"| Should be applied on the host
| {{Yes}}, for a persistent USB
| style="background-color: {{Yellow}}"| Should be applied on the host
| style="background-color: {{Yellow}}"| Should be applied on the host
| style="background-color: {{Yellow}}"| Should be applied on the host
|-
! Cold boot attack protection <ref>See [https://en.wikipedia.org/wiki/Cold_boot_attack Cold boot attack].</ref>
| {{No}} - should be applied on the host
| {{Yes}}
| {{No}} - should be applied on the host
| {{No}} <ref>https://github.com/QubesOS/qubes-issues/issues/716</ref>
| {{No}} - should be applied on the host
|-
|}
== Download Security ==
{| class="wikitable" style="text-align: center;"
|-
!
! '''{{project_name_short}}'''
! '''Tails'''
! '''Tor Browser'''
! '''Qubes OS'''
! '''corridor'''
|-
! Onion
| {{Yes}}
| {{No}}
| {{Yes}}
| {{Yes}} <ref>Mirror by unman: https://www.qubes-os.org/news/2019/04/17/tor-onion-services-available-again/</ref>
| {{No}}
|-
! TLS (SSL) <ref>
Having TLS (SSL) supported mirrors may seem like an oxymoron. The common practice is to assume that mirrors are not to be trusted. Even if the mirror owners were trusted persons, it is still an open question how good their server security is. Even if their server security is exceptional, mirrors are generally also hosted in hosting companies and we cannot trust those. However, not all adversaries have extensive capabilities like being capable of mounting man-in-the-middle attacks, breaking server security or forcing the hosting company to turn over the keys and so on. Users who do not use verification are still better off downloading from a TLS supported mirror. Therefore, TLS protected mirrors work well against less sophisticated adversaries. In terms of numbers, this results in fewer users potentially ending up with maliciously altered downloads.
</ref>
| {{Yes}}
| {{Yes}}
| {{Yes}}
| {{Yes}}
| Unneeded
|-
! [[OpenPGP]] s[[Verifying_Software_Signatures|ignatures]] a[[Verify the images#Signify_Signatures|vailable]]
| {{Yes}}
| {{Yes}}
| {{Yes}}
| {{Yes}}
| {{Yes}}
|-
! [[Signify]] signatures a[[Verify the images#Signify_Signatures|vailable]]
| {{Yes}}
| {{No}}
| {{No}}
| {{No}}
| {{No}}
|-
! [[PQCrypto#Codecrypt|Codecrypt]] ([[PQCrypto|Post-Quantum Cryptography]] Resistant) signatures available
| Planned
| {{No}}
| {{No}}
| {{No}}
| {{No}}
|-
! Server not under control of hosting provider <ref>
It would also be safer if the download server was under the full control of the developers and not under control of a company, the hosting provider. Unfortunately that is not how things work today. Self-hosting is very expensive, requires a fast internet connection (home user contracts are not fast enough), and adequate physical security. Even the servers of The Tor Project are not hosted in a developer's home. This is being elaborated in chapter [[Trust#Trusting_the_{{project_name_short}}_Website|Trusting the {{project_name_short}} Website]].
</ref>
| {{No}}
| {{No}}
| {{No}}
| {{No}}
| {{No}}
|-
|}
== Verifiable Builds ==
<!--
Editor hint. Can be edited here:
https://www.whonix.org/wiki/Template:Verifiable_Builds_Comparsion_Table
-->
'''Table:''' ''Verifiable Builds Comparison''
{{Verifiable_Builds_Comparsion_Table}}
== Fingerprint ==
'''Table:''' ''Fingerprinting Issues''
{| class="wikitable" style="text-align: center;"
|-
!
! '''{{project_name_short}}'''
! '''Tails'''
! '''Tor Browser'''
! '''Qubes OS TorVM'''
! '''corridor'''
|-
! Network / web fingerprint
| [[Fingerprint|{{project_name_short}} fingerprint page]]
| [https://tails.boum.org/doc/anonymous_internet/Tor_Browser/index.en.html#fingerprint Tails fingerprint page]
| TBB traffic is tunneled through Tor. Host traffic passes over clearnet
| ?
| ?
|-
! Network fingerprint: ISP cannot trivially guess the project type <ref>To discover if {{project_name_short}}, Tails or TBB is running.</ref>
| {{Yes}}
| {{Yes}}
| {{Yes}}
| {{No}} <ref>Because TorVM's own traffic is not torified.</ref>
| {{Yes}}
|-
! Network fingerprint: ISP cannot guess that a non-persistent Tor directory is in use
| {{Yes}}
| {{No}} <ref>Tails [https://gitlab.tails.boum.org/tails/tails/-/issues/5462 does not] support [https://support.torproject.org/#about_entry-guards persistent entry guards] yet.</ref>
| {{Yes}}
| {{Yes}}
| {{Yes}}
|-
! Clearnet traffic
| All {{project_name_gateway_short}} and {{project_name_workstation_short}} traffic is tunneled through Tor. Host traffic <ref>Operating system updates, use of a host browser and so on.</ref> uses clearnet
| None, unless other users sharing the same internet connection are not using Tails
| TBB traffic is tunneled through Tor. Host traffic <ref>Operating system updates, use of an untorified second browser and so on.</ref> uses clearnet
| The gateway is not torified, therefore emitting clearnet traffic <ref>Due to package selection, it will probably also reveal that it is an Qubes OS TorVM.</ref>
| The gateway is not torified, therefore emitting clearnet traffic
|-
! Network fingerprint: ISP cannot guess which anonymity software is in use due to the ratio of Tor and clearnet traffic
| Unknown <ref>{{project_name_short}} users might tend to have more traffic than TBB users, as operating system updates of {{project_name_workstation_short}} (<code>{{project_name_workstation_template}}</code>) and {{project_name_gateway_short}} (<code>{{project_name_gateway_template}}</code>) take place over Tor. It is unknown if the data volume is specific enough to guess a transparent or isolating proxy is in use, or if a significant proportion of other Tor users route a large amount of traffic through Tor (to help disguise {{project_name_short}} users). Research prior to the foundation of {{project_name_short}} suggested that a large amount of file sharing occurred via Tor. Classical file-sharing is likely to have far greater upload than {{project_name_short}}, but it is unclear how many people have disabled upload settings or moved to methods which have minimal upload, such as file hosters.</ref>
| The ISP can guess a Tor live system is in use, unless... <ref>The unsafe browser is in use, or other people are sharing the same Internet connection who are not using Tails.</ref>
| ?
| Not applicable <ref>See above: ''Network fingerprint: ISP cannot trivially guess the project type''.</ref>
| ?
|-
! Network fingerprint: ISP cannot guess which anonymity software is in use because of [https://tails.boum.org/contribute/design/Time_syncing/ tordate] <ref name=tordate>The [https://tails.boum.org/contribute/design/Time_syncing/#index5h1 Tails Design about Time syncing] states: <blockquote>Our initial time guess based on the Tor consensus is probably easier to fingerprint, though: a fresh Tor is started, and restarted again right after the consensus has been downloaded.</blockquote></ref>
| {{Yes}}, does not include tordate
| {{No}}, if the clock is grossly inaccurate when booting <ref name=tordate />
| {{BlueBackground}} No, not an operating system
| {{Yes}}, does not include tordate
| {{Yes}}, does not include tordate
|-
! Web fingerprint <ref>Fingerprint for the websites that are visited.</ref>
| style="background-color: {{Green}}"| Same as TBB <ref>{{project_name_short}} uses the original Tor Browser from The Tor Project, with the only difference being Tor runs on {{project_name_gateway_short}} instead of using the locally shipped Tor.</ref>
| style="background-color: {{Red}}"| Not the same as TBB <ref name=not-exactly-same-as-tbb>Refer to the following Tails resources for the latest status update: [https://web.archive.org/web/20210505033517/https://tails.boum.org/contribute/design/#index19h2 (fingerprint) for the websites that you are visiting], [https://gitlab.tails.boum.org/tails/tails/-/issues/5362 evaluate web fingerprint] and [https://tails.boum.org/contribute/design/Tor_network_configuration/ Tails: Trying to hide the fact one is using Tor].</ref>
| style="background-color: {{Green}}"| TBB <ref>This is the original Tor Browser Bundle from torproject.org.</ref>
| style="background-color: {{Red}}"| Does not include Tor Browser <ref name=torovertor>While preventing [[Tips_on_Remaining_Anonymous#Refrain_from_"Tor_over_Tor"_Scenarios|Tor over Tor]], which is recommended.</ref> <ref>This could probably be installed manually, but users are generally not aware of fingerprinting issues. Further, they usually have trouble in using Tor Browser without the bundled Tor instance - which is of course recommended to prevent [[Tips_on_Remaining_Anonymous#Refrain_from_"Tor_over_Tor"_Scenarios|Tor over Tor scenarios]].</ref>
| {{BlueBackground}} Not applicable
|-
! Unsafe browser fingerprint <ref>Tails and Liberte Linux contain a so called "Unsafe Browser". The Unsafe Browser does not use Tor and it connects in the clear. It is available on these platforms because it is useful for registering on hotspots or for general (non-anonymous) browsing purposes.</ref>
| <ref>When using VMs:
* The unsafe browser on the host is untouched, so it is not affected by installing {{project_name_short}}.
When using Physical Isolation:
* From {{project_name_short}} 0.5.6 onwards, there is no unsafe browser. A separate third machine with clearnet access could be configured.</ref>
| <ref>Tails Todo: [https://gitlab.tails.boum.org/tails/tails/-/issues/5412 Improve fingerprint of the Unsafe Browser]</ref>
| ?
| ?
| ?
|-
! Network time synchronization runs at randomized times during the session
| {{Yes}} <ref>This is useful for keeping the clock synchronized for long running sessions.</ref> <ref>See also [[Dev/TimeSync|TimeSync]].</ref>
| {{BlueBackground}} Does not continuously run network time synchronization
| {{BlueBackground}} Not an operating system, does not include network time synchronization
| {{BlueBackground}} Does not include network time synchronization
| {{BlueBackground}} Does not include network time synchronization
|-
! Connection wizard prevents unwanted / accidental connections to the public Tor network <ref>Users who want to [[Hide Tor from your Internet Service Provider|hide Tor and {{project_name_short}} from the ISP]] should not connect to the public Tor network when starting the platform for the first time.</ref>
| {{Yes}}
| {{Yes}}
| ?
| ?
| ?
|-
! Includes Tor Browser from The Tor Project
| {{Yes}}
| {{Yes}} + patches
| {{Yes}}
| {{No}}
| {{No}}
|-
! Privacy-enhanced browser <ref>Settings, patches and add-ons.</ref>
| {{Yes}}, Tor Browser
| {{Yes}}, Tor Browser + patches <ref>See [https://tails.boum.org/contribute/design/#index40h3 Tor Browser].</ref> <ref name=not-exactly-same-as-tbb />
| {{Yes}}, Tor Browser
| {{No}}
| {{BlueBackground}} Not applicable
|-
! Secure distributed network time synchronization
| {{Yes}} <ref>See [[Dev/TimeSync|TimeSync]].</ref>
| {{Yes}} <ref>See [https://tails.boum.org/contribute/design/Time_syncing/ Tails - Time syncing].</ref>
| {{No}}
| {{No}}
| {{No}}
|-
! Hides the time zone (set to UTC)
| {{Yes}}
| {{Yes}}
| {{Yes}}
| {{No}}
| {{BlueBackground}} Not applicable
|-
! Hides the operating system account name <ref name=rootexploits /> <ref name=workstation /> <ref>It is best when [https://web.archive.org/web/20141005082901/https://mailman.boum.org/pipermail/tails-dev/2013-January/002457.html account names are shared among anonymity-focused distributions].</ref>
| {{Yes}}, set to {{Code2|user}}
| {{Yes}}, set to {{Code2|amnesia}}
| {{No}}
| {{Yes}}, set to {{Code2|User}}
| {{BlueBackground}} Not applicable
|-
! Secure gpg.conf <ref>https://github.com/ioerror/torbirdy/blob/master/gpg.conf</ref> <ref>[https://github.com/ioerror/torbirdy/pull/11 gpg.conf optimized for privacy]</ref>
| {{Yes}}
| {{Yes}}
| {{BlueBackground}} Not an operating system
| {{BlueBackground}} Not an operating system
| {{BlueBackground}} Not an operating system
|-
! Privacy-enhanced IRC client configuration
| {{Yes}}
| {{Yes}}
| {{BlueBackground}} Not an IRC client
| {{BlueBackground}} Not an operating system
| {{BlueBackground}} Not an IRC client
|-
! [[Keystroke_Deanonymization|Keystroke Anonymization]]
|
* [[Qubes|{{q_project_name_short}}]]: {{No_text}} <ref>
* [https://github.com/QubesOS/qubes-issues/issues/2558 provide Linux kernel input device so kloak (anti keystroke deanonymization tool) can be used in {{q_project_name_short}}]
* [https://github.com/QubesOS/qubes-issues/issues/1850 Feature Request: Anti-Keystroke Fingerprinting Tool]
</ref>
* [[Non-Qubes-Whonix|{{non_q_project_name_short}}]]: {{Yes_text}}
| {{No}}
| {{No}}
| {{BlueBackground}} Not an operating system
| {{BlueBackground}} Not an operating system
|-
! Implement [https://forums.whonix.org/t/tcp-isn-cpu-information-leak-protection-tirdad/8552 TCP ISN CPU Information Leak Protection] to prevent [https://dl.acm.org/doi/10.1145/1180405.1180410 de-anonymization of Tor onion services] by installing [https://github.com/Kicksecure/tirdad Tirdad kernel module for random ISN generation].
|
* [[Qubes|{{q_project_name_short}}]]: {{No_text}} <ref>
* [https://github.com/QubesOS/qubes-issues/issues/2558 provide Linux kernel input device so kloak (anti keystroke deanonymization tool) can be used in {{q_project_name_short}}]
* [https://github.com/QubesOS/qubes-issues/issues/1850 Feature Request: Anti-Keystroke Fingerprinting Tool]
</ref>
* [[Non-Qubes-Whonix|{{non_q_project_name_short}}]]: {{Yes_text}}
| {{No}}
| {{No}}
| {{BlueBackground}} Not an operating system
| {{BlueBackground}} Not an operating system
|-
|}
== Miscellaneous ==
'''Table:''' ''Miscellaneous Issues''
{| class="wikitable" style="text-align: center;"
|-
!
! '''{{project_name_short}}'''
! '''Tails'''
! '''Tor Browser'''
! '''Qubes OS TorVM'''
! '''corridor'''
|-
! A warning appears when run in an unsupported / unrecommended virtualizer
| {{Yes}}
| {{Yes}}
| Unnecessary (?)
| Invalid (?) <ref>As TorVM may not run inside other virtualizers in the first place, although this is untested.</ref>
| {{BlueBackground}} Not applicable
|-
! Security and anonymity check
| {{Yes}} <ref>[https://www.kicksecure.com/wiki/Systemcheck systemcheck]</ref>
| ?
| ?
| ?
| ?
|-
|}
== Hardening ==
'''Table:''' ''Security Hardening''
{| class="wikitable" style="text-align: center;"
|-
!
! '''{{project_name_short}}'''
! '''Tails'''
! '''Tor Browser'''
! '''Qubes OS TorVM'''
! '''corridor'''
|-
! AppArmor <ref>https://en.wikipedia.org/wiki/AppArmor</ref> is enabled by default
| {{Yes}}
| ?
| ?
| ?
| ?
|-
! AppArmor profiles are enabled by default
| {{BlueBackground}} Partial <ref>Additional profiles can be [[AppArmor|manually installed]]. Profiles are already enabled by default for Tor, obfsproxy, Tor Browser and many others.</ref>
| ?
| ?
| ?
| ?
|-
! Kernel Hardening through Kernel Boot Parameters
|
* Qubes-Whonix: {{No_text}} <ref name=qubes_security_disadvantages>https://forums.whonix.org/t/qubes-whonix-security-disadvantages-help-wanted/8581</ref>
* Non-Qubes-Whonix: {{Yes_text}} <ref>https://github.com/Kicksecure/security-misc/tree/master/etc/default/grub.d</ref>
| ?
| ?
| ?
| ?
|-
! Strong Linux User Account Separation
|
* Qubes-Whonix: {{No_text}} <ref>https://github.com/QubesOS/qubes-issues/issues/2695</ref>
* Non-Qubes-Whonix: {{Yes_text}} <ref>https://www.whonix.org/wiki/Dev/Strong_Linux_User_Account_Isolation#Bruteforcing_Linux_User_Account_Passwords_Protection</ref>
| ?
| ?
| ?
| ?
|-
! [[Dev/Strong_Linux_User_Account_Isolation#Bruteforcing_Linux_User_Account_Passwords_Protection|Protection against Bruteforcing Linux User Account Passwords]]
|
* Qubes-Whonix: {{No_text}} <ref>See above.</ref>
* Non-Qubes-Whonix: {{Yes_text}}
| ?
| ?
| ?
| ?
|-
! [https://github.com/Kicksecure/security-misc security-misc] (Kernel Hardening; Improve Entropy Collection; Enhances Misc Security Settings; ...)
| {{Yes}}
| ?
| ?
| ?
| ?
|-
! [[Security-misc#SUID_Disabler_and_Permission_Hardener|SUID Disabling and Permission Hardening]]
| Planned.
| ?
| ?
| ?
| ?
|-
! [https://forums.whonix.org/t/re-mount-home-and-other-with-noexec-and-nosuid-among-other-useful-mount-options-for-better-security/7707/1 secure mount options]
| Planned.
| ?
| ?
| ?
| ?
|-
! [[Dev/Strong_Linux_User_Account_Isolation#Console_Lockdown|Console Lockdown]]
| {{Yes}}
| ?
| ?
| ?
| ?
|-
! [[hardened-kernel]]
| Planned.
| ?
| ?
| ?
| ?
|-
! [https://github.com/Kicksecure/apparmor.d apparmor.d] (AppArmor for everything. APT, systemd, init, all systemd units, all applications. Mandatory Access Control. )
| Planned.
| ?
| ?
| ?
| ?
|-
|}
== Flash / Browser Plugin Security ==
{{mbox
| type = notice
| image = [[File:Ambox_notice.png|40px|alt=Info]]
| text = Installing [[Browser Plugins|browser plugins such as Flash]] is not recommended <ref>Due to anonymity, privacy and security problems associated with Adobe Flash.</ref> when anonymity is the goal.
}}
'''Table:''' ''Flash and Browser Plugins Security''
{| class="wikitable" style="text-align: center;"
|-
!
! '''{{project_name_workstation_short}}'''
! '''Tor on the Host'''
|-
! Proxy bypass IP leak
| style="background-color: {{Green}}"| Protected
| style="background-color: {{Red}}"| Insecure, leads to deanonymization
|-
! Protocol IP leak
| style="background-color: {{Green}}"| Protected
| style="background-color: {{Red}}"| Insecure, leads to deanonymization
|-
! Flash cookies
| style="background-color: {{Yellow}}"| Reduces anonymity to pseudonymity. It is recommended to delete Flash cookies
| style="background-color: {{Red}}"| Flash activity over clearnet and Tor can be linked, which leads to deanonymization (or a significant reduction in the anonymity set) if the skew is large and rare. Flash is also useful for additional fingerprinting, which has an adverse impact <ref name=bad>If the fingerprint is detailed enough, then linkage of activities and subsequent deanonymization becomes easier.</ref>
|-
! Number of installed fonts
| style="background-color: {{Green}}"| The number of fonts inside {{project_name_workstation_short}} (<code>{{project_name_workstation_vm}}</code>) and the host (clearnet) operating system will differ, which is good for anonymity
| style="background-color: {{Red}}"| The same fonts are reported for both clearnet and Tor Flash activity, which is harmful to anonymity <ref name=bad />
|-
! Exact flash player version
| style="background-color: {{Yellow}}"| The Flash version is shared among many users, <ref name=shared-among-much-pepole>That is, it is shared among all up-to-date {{project_name_short}} users, and some Debian users. In Debian's case that would be persons using the same platform that {{project_name_short}} is based on (Debian stretch in {{project_name_short}} 14.0.0.7.4). In addition, some users of Debian derivatives (like Ubuntu) would share the same Flash version.</ref> which is good for anonymity, since it reduces the impact of fingerprinting. The version is also probably different from the host (clearnet) operating system, which is beneficial
| style="background-color: {{Red}}"| The same version is reported for Flash activity over both clearnet and Tor, which is harmful to anonymity <ref name=bad />
|-
! GNU/Linux kernel version
| style="background-color: {{Yellow}}"| This version is shared among many people, <ref name=shared-among-much-pepole /> which is good for anonymity, since it reduces the impact of fingerprinting
| style="background-color: {{Red}}"| The same version is reported for Flash activity over both clearnet and Tor <ref name=bad />
|-
! Language
| style="background-color: {{Green}}"| Set to ''en_US'' for all {{project_name_short}} users
| style="background-color: {{Red}}"| Set to the user's local language setting. This is useful for fingerprinting, since it leads to anonymity set reduction <ref name=bad />
|-
! Exact date and time
| style="background-color: {{Green}}"| This differs from the host (clearnet) operating system, which is beneficial (see [[Dev/TimeSync|TimeSync]] for details)
| style="background-color: {{Red}}"| The same time / clockskew is reported for both clearnet and Tor Flash activity, which is harmful to anonymity <ref name=bad />
|-
! Exact screen resolution and DPI
| style="background-color: {{Yellow}}"| ?
| style="background-color: {{Red}}"| The same screen resolution and DPI (dots per inch) is reported for both clearnet and Tor use, which is harmful to anonymity <ref name=bad />
|-
! Full path to the Flash plugin
| style="background-color: {{Yellow}}"| This is shared among many people, <ref name=shared-among-much-pepole /> which is good for anonymity
| style="background-color: {{Red}}"| Depends on the host (clearnet) operating system. In the worst case it could contain the operating system user name, which is fatal if it is the user's actual name. The same path to the Flash plugin is reported for both clearnet and Tor use, which is harmful to anonymity <ref name=bad />
|-
! Other factors <ref>Users can conduct their own checks on https://ip-check.info</ref>
| style="background-color: {{Yellow}}"| Assume reduction from anonymity to pseudonymity
| style="background-color: {{Red}}"| Greater possibilities for fingerprinting and linkage of activities, which is harmful to anonymity <ref name=bad />
|-