[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #10419 [Firefox Patch Issues]: Can requests to 127.0.0.1 be used to fingerprint the browser?



#10419: Can requests to 127.0.0.1 be used to fingerprint the browser?
-------------------------------------+-------------------------------------
     Reporter:  mikeperry            |      Owner:  mikeperry
         Type:  defect               |     Status:  closed
     Priority:  critical             |  Milestone:
    Component:  Firefox Patch        |    Version:
  Issues                             |   Keywords:  tbb-fingerprinting,
   Resolution:  fixed                |  tbb-pref, MikePerry201401R
Actual Points:                       |  Parent ID:
       Points:                       |
-------------------------------------+-------------------------------------

Comment (by cypherpunks):

 Previously I've been able to glue the 1Password extension into TBB (not
 supported by the 1P folks, but it worked, see post
 [http://discussions.agilebits.com/discussion/comment/99714 here] and post
 linked in that post). That appears to no longer work. I'm not certain, but
 I wonder if this fix has broken the ability to do that (the 1P extension
 uses Websocket connections to 127.0.0.1 to communicate with a helper
 process, see [http://help.agilebits.com/1Password_Windows/helper-not-
 connected.html here]).

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10419#comment:36>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs