[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #27268 [Applications/Tor Browser]: preferences cleanup
#27268: preferences cleanup
-------------------------------------------------+-------------------------
Reporter: rzb | Owner: tbb-
| team
Type: defect | Status:
| needs_review
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: ff68-esr, TorBrowserTeam201910R, | Actual Points:
GeorgKoppen201910 |
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Comment (by gk):
Replying to [comment:23 Thorin]:
> Replying to [comment:22 gk]:
> > > And I don't see a dom.netinfo.enabled in the tor button code
> >
> > Hrm. I am not sure yet what we should do. While we don't defend
against os fingerprinting leaving the netinfo state the way it is seems a
bit lame. I guess we should disable it everywhere?
>
> I agree. Lets not give away free entropy... make the bastards work for
it. Ideally, upstream we should make RFP measures more robust and anti-
tamperable (e.g. from about:config tweakers)
Actually, we had the discussion about what to do in #27257 already but
lost track of it it seems...
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27268#comment:24>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs