[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #10419 [Firefox Patch Issues]: Can requests to 127.0.0.1 be used to fingerprint the browser?



#10419: Can requests to 127.0.0.1 be used to fingerprint the browser?
-------------------------------------+-------------------------------------
     Reporter:  mikeperry            |      Owner:  mikeperry
         Type:  task                 |     Status:  needs_review
     Priority:  major                |  Milestone:
    Component:  Firefox Patch        |    Version:
  Issues                             |   Keywords:  tbb-fingerprinting,
   Resolution:                       |  tbb-pref, MikePerry201401R
Actual Points:                       |  Parent ID:
       Points:                       |
-------------------------------------+-------------------------------------

Comment (by mo):

 Replying to [comment:28 mikeperry]:
 > I want to avoid NoScript ABE policies if at all possible. Does
 completely emptying network.proxy.no_proxies_on break CUPS? Or printing on
 any other platform? I don't use CUPS.

 You cannot break printing or CUPS, all TBB could block is access to the
 local CUPS web admin panel from inside TBB (create/edit/delete printers).
 I don't see why people can't use a second browser for local web services.
 CUPS via web is so 1990s and ugly, any "beginner" uses a GUI to configure
 their printers. To me, it sounds simpler and safer to just disable any
 localhost access from within the browser, and one should not have to rely
 on an extension to take care of it.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10419#comment:31>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs