All-in-one free web application security tool. Web application vulnerability and privacy scanner with support for HTTP cookies, Flash, HTML5 localStorage, sessionStorage, CANVAS, Supercookies, Evercookies. Includes a free SSL/TLS, HTML and HTTP vulnerability scanner and URL malware scanner.
On 2020-03-12T22:04:19.952681+00:00 we found pattern Canvas_fingerprint, type: User tracking and fingerprinting, (User browser fingerprinting through HTML5 CANVAS element contents) in the page https://app.tor.us/v1.1.1/js/chunk-vend… referenced from https://app.tor.us/ .
Code sample:
b'.createElement("canvas")' … b'.createElement("canvas")' … b'.createElement("canvas")' … b'.createElement("canvas")' … b'.createElement("canvas")' … b'.createElement("canvas")' … b'.createElement("canvas")' … b'.createElement("canvas")' … b'.createElement("canvas")' … b'.createElement("canvas")' … b'.createElement("canvas")' … b'.createElement("canvas")' … b'.getContext("2d")' … b'.getContext("2d")' … b'.getContext("2d")' … b'.getContext("2d")' … b'.getContext("2d")' … b'.getContext("2d")' … b'.getContext("2d")' … b'.getContext("2d")' … b'.getContext("2d")' … b'.getContext("2d")' … b'.getContext("2d")' … b'.getContext("2d")' … b'.getContext("2d")' … b'.getContext("2d")' … b'.getContext("2d")' … b'.getContext("2d")' … b'.toDataURL()' … b'.toDataURL()' … b'.toDataURL()' … b'.getImageData(' … b'.getImageData(' … b'.getImageData(' … b'.getImageData(' … b'.getImageData(' … b'.getImageData(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode(' … b'String.fromCharCode('
This feature is experimental so please feel free to contact us if you feel any of the reported issues is a false positive or you want to suggest a pattern that should be detected (we are using Yara standard).