FINDING · DEFENSE

PWA-based circumvention tools that display their name or any identifying string in the browser URL bar or page title expose that identifier to all six Chinese browser vendors' telemetry servers, since all six browsers collect page titles and full URLs. Browser SDKs with READ_PHONE_STATE and elevated permissions can monitor PWA activity at the OS level in ways not possible with standard browsers, making browser selection as security-critical as the circumvention tool itself for the Tor Browser threat model.

From 2025-rodriguez-revisitingRevisiting BAT Browsers: Protecting At-Risk Populations from Surveillance, Censorship, and Targeted Attacks · §5, §6 · 2025 · Free and Open Communications on the Internet

Implications

Tags

censors
cn
techniques
keyword-filtering
defenses
tunnelingtor

Extracted by claude-sonnet-4-6 — review before relying.