Did you know, it's now possible to fingerprint by HTTP/2?

On Firefox, I recommend you to disable the protocoll until we find a solution to either spoof it or break the fingerprinting method. It works even without #javascript.

The whitepaper 👉 https://www.blackhat.com/docs/eu-17/materials/eu-17-Shuster-Passive-Fingerprinting-Of-HTTP2-Clients-wp.pdf

#privacy #fingerprinting #infosec #opsec #cybersecurity #http #http2 #browserleaks

Test yourself at https://browserleaks.com/http2

âť—Attention, @torproject Browser has HTTP/2 enabled and it is vulnerable to itâť—

At this time you can't disable it in #Tor, so be very careful what you do there, you can't change your fingerprint afaik yet. It doesn't change when requesting a new circuit and even when you are in the safest mode.

@gmate8 for fuck sake....

Can't even have multiple requests in the same connection without being fingerprinted