richard pushed to branch base-browser-115.11.0esr-13.5-1 at The Tor Project / Applications / Tor Browser
Commits:
-
be35122b
by Pier Angelo Vendrame at 2024-05-13T19:56:00+00:00
-
3bed85e2
by Fatih at 2024-05-13T19:56:00+00:00
1 changed file:
Changes:
... | ... | @@ -3604,20 +3604,9 @@ double nsGlobalWindowInner::GetDevicePixelRatio(CallerType aCallerType, |
3604 | 3604 | return 1.0;
|
3605 | 3605 | }
|
3606 | 3606 | |
3607 | - if (nsIGlobalObject::ShouldResistFingerprinting(aCallerType,
|
|
3608 | - RFPTarget::Unknown)) {
|
|
3609 | - // Spoofing the DevicePixelRatio causes blurriness in some situations
|
|
3610 | - // on HiDPI displays. pdf.js is a non-system caller; but it can't
|
|
3611 | - // expose the fingerprintable information, so we can safely disable
|
|
3612 | - // spoofing in this situation. It doesn't address the issue for
|
|
3613 | - // web-rendered content (including pdf.js instances on the web.)
|
|
3614 | - // In the future we hope to have a better solution to fix all HiDPI
|
|
3615 | - // blurriness...
|
|
3616 | - nsAutoCString origin;
|
|
3617 | - nsresult rv = this->GetPrincipal()->GetOrigin(origin);
|
|
3618 | - if (NS_FAILED(rv) || origin != "resource://pdf.js"_ns) {
|
|
3619 | - return 2.0;
|
|
3620 | - }
|
|
3607 | + if (nsIGlobalObject::ShouldResistFingerprinting(
|
|
3608 | + aCallerType, RFPTarget::Unknown)) {
|
|
3609 | + return 2.0;
|
|
3621 | 3610 | }
|
3622 | 3611 | |
3623 | 3612 | if (aCallerType == CallerType::NonSystem) {
|