Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Privacy Patch: Don't expose navigator.AddonManager to content (from tor browser) #204

Closed
ilikenwf opened this issue Sep 3, 2017 · 6 comments

Comments

@ilikenwf
Copy link

ilikenwf commented Sep 3, 2017

While other Tor privacy patches and commits exist, this one is yet another that will prevent "privileged" sites from getting a list of our installed addons. This one doesn't seem to be slated for upstream use in Firefox mainline yet.

There are others like this one that would be beneficial since most are used with options, IE the one that allows setting the max number of fonts used per page.

https://gitweb.torproject.org/tor-browser.git/patch/?id=5493716

With https://bugzilla.mozilla.org/show_bug.cgi?id=1245571 support for
websites to learn about installed add-ons landed. Currently, this is
only enabled for AMO related sites but we don't think this functionality
is something we want for Tor Browser as it might aid in fingerprinting
users.

The patch does not outright disable access to the API. Privileged code
is still able to use it if needed. This should help with usability
issues should they arise while mitigating possible fingerprinting and
security problems by having this API available to content.

@ilikenwf ilikenwf changed the title Tor Privacy: Don't expose navigator.AddonManager to content Privacy Patch: Don't expose navigator.AddonManager to content (from tor browser) Sep 3, 2017
@MrAlex94
Copy link
Collaborator

MrAlex94 commented Sep 4, 2017

Will look into this as well. Will probably remove it as we move away from the AMO.

@ilikenwf
Copy link
Author

ilikenwf commented Sep 5, 2017 via email

@ilikenwf
Copy link
Author

ilikenwf commented Jun 8, 2019

@MrAlex94 in v68 we should default privacy.resistFingerprinting.block_mozAddonManager to true as they added a hidden pref for it.

This and many other things are already set in the ghacks user.js file - it would be nice to see some kind of integration of that project and the user-overrides method someday...

Until then a few of my tickets could probably be solved using settings from ghacks user.js

@laniakea64
Copy link

in v68 we should default privacy.resistFingerprinting.block_mozAddonManager to true as they added a hidden pref for it.

Just to point out, Waterfox 56 has this pref too - #449

@ilikenwf ilikenwf closed this as completed Jun 9, 2019
@ilikenwf ilikenwf reopened this Jun 9, 2019
@ilikenwf
Copy link
Author

ilikenwf commented Jun 9, 2019

I guess we can leave it open so we can default both.

@laniakea64
Copy link

in v68 we should default privacy.resistFingerprinting.block_mozAddonManager to true

Unfortunately it looks like making this default isn't viable. Apparently that broke AMO for some Mac OS users - #1350

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants