samyk / evercookie

Produces persistent, respawning "super" cookies in a browser, abusing over a dozen techniques. Its goal is to identify users after they've removed standard cookies and other privacy data such as Flash cookies (LSOs), HTML5 storage, SilverLight storage, and others.
https://samy.pl/evercookie/
4.42k stars 663 forks source link

Compatibility? #107

Closed Ruok2bu closed 8 years ago

Ruok2bu commented 8 years ago

Will evercookie work on client systems that use Linux or OSX ?

samyk commented 8 years ago

Yes, many of the storage mechanisms are cross-platform

Ruok2bu commented 8 years ago

How many of them though?

samyk commented 8 years ago

It's more browser dependent than platform dependent. It looks like about a dozen should work on Firefox on Linux.

ssokolow commented 8 years ago

It's been a long time and all I remember for certain is that I managed to successfully configure my Firefox to kill evercookies on restart, but here's how I thing it went:

Any browser which supports the feature:

Any browser with a Flash plugin:

Any browser with a Java plugin:

Any browser with a Silverlight plugin:

WebKit-based browsers:

MSIE and browsers based on its ActiveX control:

Any browser/plugin old enough to not have closed this vulnerability:

P.S. Sorry for replying via e-mail. GitHub is giving me persistent errors when I try to post a comment via the web interface.

On 16-04-23 01:24 AM, Samy Kamkar wrote:

It's more browser dependent than platform dependent. It looks like about a dozen should work on Firefox on Linux.

— You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub https://github.com/samyk/evercookie/issues/107#issuecomment-213666895

Ruok2bu commented 8 years ago

Ah, thanks for the info!