[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #13236 [- Select a component]: investigate Firefox SSL for things that might allows user tracking



#13236: investigate Firefox SSL for things that might allows user tracking
----------------------------------+---------------------
 Reporter:  arthuredelstein       |          Owner:
     Type:  defect                |         Status:  new
 Priority:  normal                |      Milestone:
Component:  - Select a component  |        Version:
 Keywords:                        |  Actual Points:
Parent ID:                        |         Points:
----------------------------------+---------------------
 From a [https://bugzilla.mozilla.org/show_bug.cgi?id=967977#c8 comment by
 Patrick McManus]:

 > (In reply to David Keeler (:keeler) [use needinfo?] from comment #5)
 > > mcmanus, are there other TLS features that are enabled by default that
 would
 > > allow tracking users? (The aim of this bug is to add an option that
 would
 > > prevent that sort of thing.)
 >
 > sure - at various levels of granularity. None as extreme as session
 tickets.
 > Anything that keeps state, right?
 >
 > some that come to mind:
 > * the version intolerance cache
 > * our false start behavior involves "have I seen this algorithm before"
 > * the hsts database

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13236>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs