

This means that the user will need to have enabled this feature for private browsing if we are to get artefacts from there. Note that setting the browser to never remember your history is different to private browsing when it comes to installing plugins. Plugins & Private Browsingīy default, plugins installed on both Firefox and Chrome do not persist to private browsing mode. The point here is that for a well know site there are several entries, not just one. Like many sites they use tools to track site usage, and to deliver adverts.įor the purposes of this post, I won’t be going into what each entry means or why there are a number of different domains. That is a very quick way to kill off a business. I would say it is safe to assume that Reddit would never knowingly deliver malicious content to visitors (and there is nothing in this image that would make me think that’s the case!). But surely there aren’t that many scripts? NoScript looks to protect users by allowing them to decide which sites are allowed to run these scripts. These scripts are often used to correctly display a page to a user, but can also be used for more nefarious, or intrusive, purposes. NoScript is a browser plugin that enables the blocking of scripts/plugins (JavaScript, Flash, Java etc) from running on pages. Other assumptions will be covered throughout the post, but these are not outside the realms of what would be considered expected user behavior. There are a number of assumptions that need to be made, most importantly that the user is actively using the NoScript plugin as it was intended, or in regards TOR that the user has “safer” or “safest” set as the security setting. In this blog post I plan to show that using the NoScript plugin it is possible to glean information about what sites, or files, a user accessed while in a private browsing session and also whilst using the TOR browser.
