[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #10286 [Applications/Tor Browser]: Touch events leak absolute screen coordinates



#10286: Touch events leak absolute screen coordinates
-------------------------------------------------+-------------------------
 Reporter:  mikeperry                            |          Owner:
                                                 |  arthuredelstein
     Type:  defect                               |         Status:
                                                 |  needs_revision
 Priority:  High                                 |      Milestone:
Component:  Applications/Tor Browser             |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  tbb-fingerprinting-resolution,       |  Actual Points:
  ff52-esr, tbb-testcase, tbb-firefox-patch,     |
  tbb-7.0-must-alpha, TorBrowserTeam201705       |
Parent ID:                                       |         Points:
 Reviewer:                                       |        Sponsor:
                                                 |  Sponsor4
-------------------------------------------------+-------------------------
Changes (by gk):

 * keywords:
     tbb-fingerprinting-resolution, ff52-esr, tbb-testcase, tbb-firefox-
     patch, tbb-7.0-must-alpha, TorBrowserTeam201705R
     =>
     tbb-fingerprinting-resolution, ff52-esr, tbb-testcase, tbb-firefox-
     patch, tbb-7.0-must-alpha, TorBrowserTeam201705
 * status:  needs_review => needs_revision


Comment:

 Replying to [comment:25 arthuredelstein]:
 > I have thought some more and I now think my reasoning in comment:24 is
 wrong. Some laptop/desktop users will be using a touch screen or stylus
 frequently, which means that two such sessions can be positively
 correlated. That means we have allowed some fingerprinting, even if a
 third session where the Touch API is not used cannot be positively linked
 to the first two.
 >
 > So now I am inclined to disable the Touch API altogether. Here's a new
 branch with 3 patches. The first simply disables the pref. The next two
 patches are the same as before (censoring the true screenX, etc.); the
 latter two are included as a possible defense in depth, in case the Touch
 API gets activated by the user or by us in the future, but those patches
 are not absolutely necessary.
 >
 > ​https://github.com/arthuredelstein/tor-browser/commits/10286+2

 I think the approach is okay for now. We might want to think harder
 whether we want to enable touch support in the future by default and rely
 only on the spoofing.

 Arthur: Did you run the test? It seems it passes/fails depending on the
 platform which seems suboptimal. If that's the case can you fix that? Then
 there is a typo: 100286 (we don't have 6-digit bug numbers yet). I got
 confused by the pointer event references, in particular
 https://bugzilla.mozilla.org/show_bug.cgi?id=1000870 in the test. Is that
 the way to write tests for touch event related things?

 FWIW: I did not compile the code yet nor did I run a Tor Browser with the
 patches.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10286#comment:28>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs