Hello Tails devs,

Regarding VPN browser proposal on gitlab:

https://gitlab.tails.boum.org/tails/tails/-/issues/19465

One key thing that is being common with blocking VPN's, triggering captcha's, 
and browser fingerprinting is when the IP of the VPN doesn't match the 
javascript get timezone (via new Date().getTimezoneOffset() or 
Intl.DateTimeFormat().resolvedOptions().timeZone).

I have tested this outside of Tor/VPN be simply changing my system timezone and 
simply browsing websites which equaled more capatchas or annoyances triggered.

Because VPN already routes all traffic through the VPN, the only remaining 
“leak” is the local timezone offset that many sites read via JavaScript 
(Date.getTimezoneOffset()). Isolating the timezone eliminates that and can be 
done via bwrap I'm pretty sure.

You could ping something to get the string `TZ_NAME=$(curl -s 
https://ipapi.co/timezone)` but I feel that increases attack surface and it 
looks like to geo-ip data base packages are already included so you could do it 
locally?

libgeocode-glib-2.0 and tor-geoipdb

If the lookup fails (e.g., the IP isn’t in the DB), could fall back to a 
default you choose Etc/UTC but you would need an overlay that interacts with 
this for bwrap
I don't think it would be worth messing with changing the local system timezone 
for the VPN with the browser but simply isolate separate timezone so the 
browser thinks the local machine time matches that of the VPN.

Thanks,
Nakamoto
_______________________________________________
Tails-dev mailing list
[email protected]
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
[email protected].

Reply via email to