[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #21549 [Applications/Tor Browser]: Investigate wasm for linkability/fingerprintability/disk avoidance issues
#21549: Investigate wasm for linkability/fingerprintability/disk avoidance issues
-------------------------------------------------+-------------------------
Reporter: gk | Owner: tbb-
| team
Type: task | Status: new
Priority: Very High | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: ff68-esr, tbb-9.0, | Actual Points:
TorBrowserTeam201910 |
Parent ID: | Points: 1
Reviewer: | Sponsor:
| Sponsor44-can
-------------------------------------------------+-------------------------
Comment (by sysrqb):
I don't see any significant fingerprinting or linkability issues in the
wasm implementation. I don't see any caching across principals. There is a
minor fingerprinting risk due to timing leaks (how quickly the wasm byte
code is returned as a Module), and how quickly a wasm function is
executed. There is the additional risk of malicious byte code exploiting a
compiler bug. However, these seem no worse than the existing javascript
attack surface - wasm simply adds more options.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21549#comment:32>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs