[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #26146 [Applications/Tor Browser]: Setting `general.useragent.override` does not spoof the platform part anymore in ESR 60 which is confusing
#26146: Setting `general.useragent.override` does not spoof the platform part
anymore in ESR 60 which is confusing
---------------------------------------------+--------------------------
Reporter: gk | Owner: tbb-team
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: ff60-esr, tbb-fingerprinting-os | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
---------------------------------------------+--------------------------
Comment (by gk):
Replying to [comment:25 temp123]:
> Replying to [comment:23 gk]:
> > The slider is for adjusting the *security* against *browser
exploitation*.
>
> https://tb-manual.torproject.org/en-US/security-slider.html
>
> > Tor Browser includes a “Security Slider” that lets you increase your
security by disabling certain web features that can be used to attack your
security **and anonymity**.
Yes, security breaches may easily affect your anonymity (Tor's protections
can bypassed that way) which is why both concepts are used in the same
sentence. It has nothing to do with fingerprinting resistance here. If you
feel that's not clear enough please file a ticket at this bug tracker so
we can clarify our manual.
> It would make sense to leave general.useragent.override as is and set
privacy.resistFingerprinting to false when the security slider is moved to
"Safest".
>
> Reasoning:
> - A user-agent which differs from general.useragent.override is an
anonymity issue
> - Javascript is disabled when security slider is moved to "Safest"
> - privacy.resistFingerprinting deals with privacy issues which are
relevant only when javascript is enabled
`privacy.resistFingerprinting` deals with way more than the user agent but
more importantly even if you have JavaScript disabled then you are *not*
safe against fingerprinting risks. That ship has sailed long ago as the
web has gotten more powerful over the years.
> This would give those who want to trade a bit of anonymity and security
for a better browsing experience the option while not affecting those who
want the highest/safest level of anonymity and security.
I think you are misunderstanding something here: Tor Browser's privacy
guarantees hold for everyone. It's the security side that some of our
users need/want to adjust to their specific needs.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26146#comment:28>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs