upvote
This excerpt from the article describes the risk well.

> In Firefox Private Browsing mode, the identifier can also persist after all private windows are closed, as long as the Firefox process remains running. In Tor Browser, the stable identifier persists even through the "New Identity" feature, which is designed to be a full reset that clears cookies and browser history and uses new Tor circuits.

reply
I wonder why "New Identity" wasn't implemented as a fork-and-exec with a newly created profile?
reply
Follow the money.
reply
Or it could just be a bug.
reply
Seriously. TOR is primarily funded by the US government. Maybe this or not all bugs are deliberately left in for the sake of allowing backdoors, but people should not forget this
reply
This is where you use id bridging.

1. Website fingerprints the browser, stores a cookie with an ID and a fingerprint.

2. During the next session, it fingerprints again and compares with the cookie. If fingerprint changed, notify server about old and new fingerprint.

reply
Many users leave their browsers open for months.
reply
Privacy and security conscious Tor users don’t.
reply
Open enough tabs and you'd be lucky to keep firefox running for more than a couple weeks.
reply
I have had hundreds of tabs open for many months in the past. The bottleneck is usually the OS crashing rather than firefox.
reply
I have 488 tabs in the session with more than 50 loaded. The running session has 72 processes.
reply
Would it though? I guess state agencies already know all nodes or may know all nodes. When you have a ton of meta-information all cross-linked, they can probably identify people quite accurately; may not even need 100% accuracy at all times and could do with less. I was thinking about that when they used information from any surrounding area or even sniffing through walls (I think? I don't quite recall the article but wasn't there an article like that in the last 3-5 years? The idea is to amass as much information as possible, even if it may not primarily have to do with solely the target user alone; e. g. I would call it "identify via proxy information").
reply
> I guess state agencies already know all nodes or may know all nodes.

Assume the same.

>The idea is to amass as much information as possible

Reminded, from 2012: https://www.wired.com/2012/03/ff-nsadatacenter/

reply
All Tor nodes are publicly known. Just knowing them doesn't help tracking at all because of onion routing, they would need access to all nodes.

https://metrics.torproject.org/rs.html

reply