[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #13236 [- Select a component]: investigate Firefox SSL for things that might allows user tracking
#13236: investigate Firefox SSL for things that might allows user tracking
----------------------------------+---------------------
Reporter: arthuredelstein | Owner:
Type: defect | Status: new
Priority: normal | Milestone:
Component: - Select a component | Version:
Keywords: | Actual Points:
Parent ID: | Points:
----------------------------------+---------------------
From a [https://bugzilla.mozilla.org/show_bug.cgi?id=967977#c8 comment by
Patrick McManus]:
> (In reply to David Keeler (:keeler) [use needinfo?] from comment #5)
> > mcmanus, are there other TLS features that are enabled by default that
would
> > allow tracking users? (The aim of this bug is to add an option that
would
> > prevent that sort of thing.)
>
> sure - at various levels of granularity. None as extreme as session
tickets.
> Anything that keeps state, right?
>
> some that come to mind:
> * the version intolerance cache
> * our false start behavior involves "have I seen this algorithm before"
> * the hsts database
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13236>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs