Closed
Bug 1413842
Opened 7 years ago
Closed 6 years ago
The browserleaks information of Nightly (with privacy.resistFingerprinting pref enabled) and Tor browser do not match
Categories
(Core :: General, defect, P3)
Tracking
()
RESOLVED
WONTFIX
Tracking | Status | |
---|---|---|
firefox58 | --- | affected |
People
(Reporter: hyacoub, Unassigned)
References
(Blocks 1 open bug)
Details
(Whiteboard: [fingerprinting])
Attachments
(3 files)
[Affected versions]: Nightly 58.0a1 and latest Tor [Affected platforms]: Platforms: Ubuntu 16.04 x64 [Steps to reproduce]: 1. Open latest nightly and enable "privacy.resistFingerprinting" parameter. 2. Go to https://browserleaks.com/javascript. 3. Repeat the above step with Tor browser. 4. Compare output of Firefox browser vs. Tor browser. [Expected result]: The output information should match. [Actual results]: The output information do not match.
Reporter | ||
Comment 1•7 years ago
|
||
Comment 2•7 years ago
|
||
It is also reproducible in Windows 10 with 4k monitor. The javascript browser information of Nightly 58.0a1 and tor 7.0.8 do not match.
Updated•7 years ago
|
Priority: -- → P2
Whiteboard: [fingerprinting]
Updated•6 years ago
|
Whiteboard: [fingerprinting] → [fingerprinting][fp-triaged]
Updated•6 years ago
|
Priority: P2 → P3
Updated•6 years ago
|
Whiteboard: [fingerprinting][fp-triaged] → [fingerprinting]
Comment 4•6 years ago
|
||
Because this test is out of date, we will need to rerun it to analyze the data. This will be done in Bug 1401493.
Status: NEW → RESOLVED
Closed: 6 years ago
Resolution: --- → WONTFIX
You need to log in
before you can comment on or make changes to this bug.
Description
•