[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #22127 [Applications/Tor Browser]: Think about a more elaborate defense against fingerprinting with `hardwareConcurrency`
#22127: Think about a more elaborate defense against fingerprinting with
`hardwareConcurrency`
------------------------------------------+--------------------------------
Reporter: gk | Owner: tbb-team
Type: enhancement | Status: new
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Keywords: tbb-fingerprinting
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
------------------------------------------+--------------------------------
In #21675 we set `dom.maxHardwareConcurrency` to `1` making users uniform.
The cost for those with computers with more than 1 core could be
performance degradation. We could think about following a bucket approach
here, too, to mitigate that while still providing fingerprinting
protection: users with up to and including 3 cores report back 1 core,
users with 4 and up to and including 7 cores report 4 back and users with
8 or more cores report 8 back. It would be neat if we could apply that to
#18559 as well although this might be an orthogonal problem.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/22127>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs