Closed
Bug 1425130
Opened 7 years ago
Closed 2 years ago
Sensor API exposes a High-Res timestamp
Categories
(Core :: DOM: Security, enhancement, P3)
Core
DOM: Security
Tracking
()
RESOLVED
DUPLICATE
of bug 1432631
Tracking | Status | |
---|---|---|
firefox59 | --- | affected |
People
(Reporter: tjr, Unassigned)
References
(Blocks 2 open bugs)
Details
(Whiteboard: [fingerprinting][domsecurity-backlog1][fp-triaged])
https://w3c.github.io/sensors/#model-sensor
We'll need to make sure this is rounded. We'll also need to make sure that the frequency of readings from any/all sensors are limited to no more often than the rounding value.
Updated•7 years ago
|
Priority: -- → P3
Whiteboard: [fingerprinting] → [fingerprinting][domsecurity-backlog1]
Comment 2•6 years ago
|
||
Since Sensor API hasn't implemented in Firefox yet, so I think we can put this as P3. However, we should still keep eye on this; making sure the timestamp is always rounded in fingerprinting resistance mode as long as this API is implemented.
Priority: P2 → P3
Reporter | ||
Updated•6 years ago
|
Blocks: uplift_tor_fingerprinting
Whiteboard: [fingerprinting][domsecurity-backlog1] → [fingerprinting][domsecurity-backlog1][fp-triaged]
Updated•2 years ago
|
Severity: normal → S3
Reporter | ||
Comment 4•2 years ago
|
||
I expect that any sensor implementation if it happens will expose timestamps in the standard way we expose all timestamps in Firefox, and therefore be protected as expected. We don't need this bug hanging around.
You need to log in
before you can comment on or make changes to this bug.
Description
•