WebGL extensions should be disabled when private.resistFingerprinting is enabled
Categories
(Core :: Graphics: CanvasWebGL, enhancement, P2)
Tracking
()
People
(Reporter: arthur, Unassigned)
References
(Blocks 1 open bug)
Details
(Keywords: dev-doc-needed, Whiteboard: [tor 6370][gfx-noted][fingerprinting][fp-triaged])
Attachments
(1 file)
Reporter | ||
Comment 1•6 years ago
|
||
Updated•6 years ago
|
Updated•6 years ago
|
Updated•6 years ago
|
Updated•6 years ago
|
Comment 2•5 years ago
|
||
Comment 3•4 years ago
|
||
Unassign myself because I am no longer actively working on this.
Comment 4•4 years ago
|
||
Either that, or have a toggle button to enable it (because it should be disabled by default; according to EFF's panopticlick, WebGL is the biggest leaker of info).
Comment 5•4 years ago
|
||
How much effort do you think this should take for someone entirely not familiar with FFox's source code?
Comment 6•4 years ago
|
||
I just disable webgl, and panopticlick can still do some webgl ops to the point of producing a fingerprint. Should I open a new bug about this?
Comment 7•4 years ago
|
||
(In reply to Marcos Dione from comment #6)
I just disable webgl, and panopticlick can still do some webgl ops to the point of producing a fingerprint. Should I open a new bug about this?
13ae805231fcd00154a46b5a992143ec
is their way of saying webgl is disabled: it's hash of nothing. That it currently says 1 in 9 indicates that (not that you should read too much into entropy figures here: the data sets are not real world and are tainted). It also says no javascript
for webgl vendor & renderer.
This ticket is about disabling webgl extensions, not webgl itself - that is Bug 1428034
Comment 8•3 years ago
|
||
updated info: tor browser
- ignore:
webgl.disable-extensions
=true
: deprecated FF74+ Bug 1477756 - ignore:
webgl.disable-fail-if-major-performance-caveat
=true
: default true FF86+ Bug 1678652 webgl.enable-webgl2
=false
webgl.default-antialias
=false
is an interesting proposal
Tor Browser has webgl behind their security-slider, and blocks readPixels() regardless. I don't think TB's model fits Firefox. TB wants to reduce entropy in webgl parameters which doesn't matter because webgl is effectively blocked - Firefox can't do that.
Maybe we can converge a little: Firefox RFP to allow a site exception for readPixels(), similar to canvas: default block and limit parameters with webgl2 and antialias
Where are we at with software rendering? e.g. Bug 1724558
Updated•2 years ago
|
Description
•