Whether this is bad depends on your threat model. Additionally, you must also consider that other search engines are able to easily identify you without you explicitly identifying yourself. If you can’t fool https://abrahamjuliot.github.io/creepjs/, you certainly can’t fool Google for instance. And that’s even ignoring the immense identifying potential of user behaviour.
Billing supports OpenNode AFAICT which I guess you could funnel your Moneros through but meh.
When I open Tor browser on my desktop–not in Tails–that site doesn’t even load. So either it is fooling it, or it requires javascript to run, which I have turned off by default in Tor.
Whether this is bad depends on your threat model. Additionally, you must also consider that other search engines are able to easily identify you without you explicitly identifying yourself. If you can’t fool https://abrahamjuliot.github.io/creepjs/, you certainly can’t fool Google for instance. And that’s even ignoring the immense identifying potential of user behaviour.
Billing supports OpenNode AFAICT which I guess you could funnel your Moneros through but meh.
Edit: Phrasing.
When I open Tor browser on my desktop–not in Tails–that site doesn’t even load. So either it is fooling it, or it requires javascript to run, which I have turned off by default in Tor.
I’m going to leave it at that.