Closed Bug 1413842 Opened 7 years ago Closed 6 years ago

The browserleaks information of Nightly (with privacy.resistFingerprinting pref enabled) and Tor browser do not match

Categories

(Core :: General, defect, P3)

58 Branch
defect

Tracking

()

RESOLVED WONTFIX
Tracking Status
firefox58 --- affected

People

(Reporter: hyacoub, Unassigned)

References

(Blocks 1 open bug)

Details

(Whiteboard: [fingerprinting])

Attachments

(3 files)

[Affected versions]: 
Nightly 58.0a1 and latest Tor

[Affected platforms]:
Platforms: Ubuntu 16.04 x64

[Steps to reproduce]:
1. Open latest nightly and enable "privacy.resistFingerprinting" parameter. 
2. Go to https://browserleaks.com/javascript.
3. Repeat the above step with Tor browser.
4. Compare output of Firefox browser vs. Tor browser.

[Expected result]:
The output information should match.

[Actual results]:
The output information do not match.
Blocks: 1401493
It is also reproducible in Windows 10 with 4k monitor. The javascript browser information of Nightly 58.0a1 and tor 7.0.8 do not match.
Priority: -- → P2
Whiteboard: [fingerprinting]
Whiteboard: [fingerprinting] → [fingerprinting][fp-triaged]
Priority: P2 → P3
Whiteboard: [fingerprinting][fp-triaged] → [fingerprinting]
Because this test is out of date, we will need to rerun it to analyze the data. This will be done in Bug 1401493.
Status: NEW → RESOLVED
Closed: 6 years ago
Resolution: --- → WONTFIX
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: