Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Defend against advanced fingerprinting techniques #10651

Closed
fmarier opened this issue Jul 9, 2020 · 1 comment
Closed

Defend against advanced fingerprinting techniques #10651

fmarier opened this issue Jul 9, 2020 · 1 comment
Assignees
Labels
closed/invalid priority/P3 The next thing for us to work on. It'll ride the trains. privacy/tracking Preventing sites from tracking users across the web privacy

Comments

@fmarier
Copy link
Member

fmarier commented Jul 9, 2020

These blog posts list a number of fingerprinting techniques that WhiteOps use:

We should examine them to see which ones we could defend against.

@fmarier fmarier added privacy privacy/tracking Preventing sites from tracking users across the web labels Jul 9, 2020
@pes10k pes10k self-assigned this Jul 21, 2020
@pes10k pes10k added the priority/P3 The next thing for us to work on. It'll ride the trains. label Jul 21, 2020
@pes10k
Copy link
Contributor

pes10k commented Jul 23, 2020

A brief update on this; i dont think there is much here thats actionable by us.

Most of the oddball stuff is targeting other browsers (particularly microsoft stuff).

Reddit is checking for navigator.brave though ¯_(ツ)_/¯

The other fingerprinting stuff is mostly well understood and common (fonts, floating point implementation, common extensions, etc). Maybe the one interesting one though is that they use DRM features and hardware codecs, which are not likely to be useful in most cases, but could leak useful info on some platforms.

One other thing that might be of interest is that they check for WEBGL_debug_renderer_info. We have protections in aggressive fingerprinting protections, but i don't know what we could do here w/o non-trivial webcompat risk in the default case.

In general, I'm glad for the share @fmarier but i dont think there is anything in here thats actionable thats not already covered by other issues, so im going to close. But thanks again for the share!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
closed/invalid priority/P3 The next thing for us to work on. It'll ride the trains. privacy/tracking Preventing sites from tracking users across the web privacy
Projects
None yet
Development

No branches or pull requests

2 participants