#27268: preferences cleanup -------------------------------------------------+------------------------- Reporter: rzb | Owner: tbb- | team Type: defect | Status: | needs_review Priority: Medium | Milestone: Component: Applications/Tor Browser | Version: Severity: Normal | Resolution: Keywords: ff68-esr, TorBrowserTeam201910R, | Actual Points: GeorgKoppen201910 | Parent ID: | Points: Reviewer: | Sponsor: -------------------------------------------------+-------------------------
Comment (by gk): Replying to [comment:23 Thorin]: > Replying to [comment:22 gk]: > > > And I don't see a dom.netinfo.enabled in the tor button code > > > > Hrm. I am not sure yet what we should do. While we don't defend against os fingerprinting leaving the netinfo state the way it is seems a bit lame. I guess we should disable it everywhere? > > I agree. Lets not give away free entropy... make the bastards work for it. Ideally, upstream we should make RFP measures more robust and anti- tamperable (e.g. from about:config tweakers) Actually, we had the discussion about what to do in #27257 already but lost track of it it seems... -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27268#comment:24> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs