What is the difference between the Tor browser initiated by Firefox v68.9.0esr and Brave Version 1.10.97 Chromium: 83.0?

Tor Asked by DebanjanB on September 28, 2021

I’m using Tor browser initiated through Firefox v68.9.0esr and Brave Version 1.10.97 Chromium: 83.0 interchangeably for quite some time now.

While automating I’m able to able to start a Mozilla based TOR browser using
Selenium but as a proof of concept I want to start a Brave browser based TOR enabled session.

I know there are some difference but I’m yet to come to a conclusion about the difference between the two configuration / implementation. Can someone help me out please?

Snapshot of Tor browser initiated by Firefox v68.9.0esr:


Snapshot of Tor browser initiated by Brave Version 1.10.97 Chromium: 83.0:


One Answer

This question has already been answered but because you have a bounty, I can't mark it as such.

From Brave:

Brave includes best-effort defense against browser fingerprinting. Broadly speaking, browser fingerprinting is the detection of browser and operating system features that differ between users for the purpose of covertly identifying users and tracking them across the web. Although fingerprinting attacks will always be possible, it is worthwhile for us to make these attacks as slow / costly / difficult as possible.

Brave includes two types of fingerprinting protections, (i) blocking, removing or modifying APIs, to make Brave instances look as similar as possible, and (ii) randomizing values from APIs, to prevent cross session and site linking (e.g. making Brave instances look different to websites each time).

In cases where we block, remove or modify API behavior, we attempt to return empty, or non-identifying values, that have the "shape" of expected values, to minimize web compatibility issues.

In cases where we randomize API values, we attempt to make modifications that are imperceivable to humans, but distinguishing to computers / fingerprinters. These randomization values are derived from a seed that changes per session, and per eTLD+1. Third party frames and script share the seed value of the top level, eTLD+1 domain. This approach is especially useful in fingerprinters that hash together a large number of semi-identifiers into a single identifier, since randomizing just one value "poisons" the entire fingerprint.

Tor takes a different approach. It seeks to make everyone look exactly the same. If you modify the Tor Browser with addons, etc, you start to look different to a web server and therefore you are more easily picked out.

Tor Browser is dedicated to Anonymity. That is its single goal. Brave is a general purpose browser and is not dedicated to anonymity.

Answered by JSEvans on September 28, 2021

Add your own answers!

Related Questions

tor isn’t routing, how do I configure it?

1  Asked on September 28, 2021 by imrek


What’s to stop a bad directory operator?

1  Asked on September 28, 2021 by 0x777c


I have this issue and cant log connect to tor

1  Asked on September 28, 2021 by riddis


The first time it connected just fine but now this happens

1  Asked on September 28, 2021 by user25280


Can’t get Meek PT’s or IPv6 addresses?

1  Asked on September 28, 2021


Failing to set up TOR for command-line use on Mac

1  Asked on September 28, 2021 by wass-rubleff


Most Secure Connection

2  Asked on September 28, 2021 by searcher


How to use meek with Tor expert bundle?

1  Asked on September 28, 2021


Tor Hidden Service Suddenly Stopped Working

1  Asked on September 28, 2021 by johno-cown


is this a threat to tor?

1  Asked on September 28, 2021 by user30454


Ask a Question

Get help from others!

© 2023 All rights reserved. Sites we Love: PCI Database, MenuIva, UKBizDB, Menu Kuliner, Sharing RPP, SolveDir