[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #27268 [Applications/Tor Browser]: preferences cleanup



#27268: preferences cleanup
-------------------------------------------------+-------------------------
 Reporter:  rzb                                  |          Owner:  tbb-
                                                 |  team
     Type:  defect                               |         Status:
                                                 |  needs_review
 Priority:  Medium                               |      Milestone:
Component:  Applications/Tor Browser             |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  ff68-esr, TorBrowserTeam201910R,     |  Actual Points:
  GeorgKoppen201910                              |
Parent ID:                                       |         Points:
 Reviewer:                                       |        Sponsor:
-------------------------------------------------+-------------------------

Comment (by gk):

 Replying to [comment:23 Thorin]:
 > Replying to [comment:22 gk]:
 > > > And I don't see a dom.netinfo.enabled in the tor button code
 > >
 > > Hrm. I am not sure yet what we should do. While we don't defend
 against os fingerprinting leaving the netinfo state the way it is seems a
 bit lame. I guess we should disable it everywhere?
 >
 > I agree. Lets not give away free entropy... make the bastards work for
 it. Ideally, upstream we should make RFP measures more robust and anti-
 tamperable (e.g.  from about:config tweakers)

 Actually, we had the discussion about what to do in #27257 already but
 lost track of it it seems...

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27268#comment:24>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs