[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #24948 [Applications/Tor Browser]: Defense against resource:// and chrome:// fingerprinting breaks other addons (was: Torbutton breaks other addons)
#24948: Defense against resource:// and chrome:// fingerprinting breaks other
addons
-----------------------------------------------+--------------------------
Reporter: vanowm | Owner: tbb-team
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: tbb-torbutton, ff60-esr-will-have | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------------------------+--------------------------
Changes (by gk):
* keywords: => tbb-torbutton, ff60-esr-will-have
* owner: (none) => tbb-team
* component: Applications/Torbutton => Applications/Tor Browser
Comment:
The defense against fingerprinting via resouce:// and chrome:// links
embedded into web sites is causing the breakage (see: #8725). If you
really think that's okay for you just flip
`extensions.torbutton.resource_and_chrome_uri_fingerprinting` and set it
to `true`. Then your extensions will work again. Patches are welcome to
make the stopgap we deployed working with those and other extensions while
still mitigating the fingerprinting. We won't work on that, though.
Assuming that our upstreamed patch does not have this problem then this
will be fixed with the switch to ESR 60.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24948#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs