-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
privacy.resistFingerprinting #56
Comments
I am note sure what this exactly implies before reading this in more details. I reopen here now. Fo you have concrete suggestions about the setting or is it a bigger deal to use it correctly? |
Just picking some points for the moment:
So for new profiles it would be a tri-state switch (and hard to explain to users), for existing profiles probably manual work needed. And the best fingerprint probably the one of the tor browser (the more settings are included in resistFingerprint, the better). I would have said maybe it needs an helper extension, but firefox 57+ extensions won't be able to change "about:config" settings. |
Maybe mozilla can be convinced to a "RFP overrides settings" option? Either another integer value or per pref, like
Yes and I think it only scratches on the surface. Still it tries to get some of the main points. When I imagine people browsing with year old cookies, I suddenly realize how much protection a single setting can give you. |
The fingerprinting we need to fear is the stable fingerprint, not the unique one. Install one font and lose your font-fingerprint. Now reduce it to a few bit linux vs. windows fonts, install one font and do not lose it.
From the vast amount of input I think the ghacks things are what I want to process next, because it comes with some more documentation than most. If you're still searching for more unsorted input, look in the wiki of this project, there are quite a few collections linked. |
They have a point about bits of information, but they present it in the wrong way.
A lot of work ... |
For the useragent, RFP overrides This is no good thing, as Firefox 50 now isn't very common anymore. I do not get why they don't set this to the current ESR or the previous ESR if the current one is too recent. |
It's been a while this issue has progressed, has there been any updates around this? Do we know what I as an end user of profile maker can do to maximise my privacy (whether that's using |
This is still a complicated question. Resist fingerprinting is a powerful tool for having a single switch that increases your privacy without thinking about the details. This comes at the cost of breaking a few features and for example instantly lowering your reCaptcha score. You'll probably get a very bad rating at reCaptcha v3 (what may become a huge problem for any privacy optimized profile when it becomes widely deployed) and get harder image puzzles. In general the option seems to try to bring tor-browser features into the mainline Firefox, possibly for making it easier to maintain them when Mozilla likes to have them in the main codebase. It is for a generated profile probably better to configure each feature separately, so you know what you changed and why (on the other hand you need to undo it separately when something is broken), but I don't know if all things from resistFingerprinting are covered by the generator. My personal pet peeve with the setting is, that it disallows to override the user agent and sets the latest ESR user agent. |
#253 - Breaks Dark/Light Theme detection |
It seems here were a lot of replies deleted. For people coming from the homepage to read about the problems: PreventFingerprinting bundles a lot of settings that can break things. And it prevents some more specific settings, so you can't choose yourself how you want to override the default value. Maybe we should remove it altogether and add the relevant settings one by one. preventFingerprinting is a nice switch to get tor-browser features into Firefox, but breaks many things in unexpected ways. |
I believe there's a relatively new approach to RFP called user_pref("privacy.fingerprintingProtection", true);
user_pref("privacy.fingerprintingProtection.pbmode", true);
user_pref("privacy.fingerprintingProtection.overrides", "+AllTargets,-CSSPrefersColorScheme");
// 115ESR doesn't support +AllTargets
user_pref("privacy.fingerprintingProtection.overrides", "-CSSPrefersColorScheme,+TouchEvents,+PointerEvents,+KeyboardEvents,+ScreenOrientation,+SpeechSynthesis,+CSSPrefersReducedMotion,+CSSPrefersContrast,+CanvasRandomization,+CanvasImageExtractionPrompt,+CanvasExtractionFromThirdPartiesIsBlocked,+CanvasExtractionBeforeUserInputIsBlocked,+NavigatorAppName,+NavigatorAppVersion,+NavigatorBuildID,+NavigatorHWConcurrency,+NavigatorOscpu,+NavigatorPlatform,+NavigatorUserAgent,+StreamTrackLabel,+StreamVideoFacingMode");
user_pref("general.useragent.override", "Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0"); |
That looks interesting. Relevant file (for FF 115): https://hg.mozilla.org/mozilla-central/file/FIREFOX_NIGHTLY_115_END/toolkit/components/resistfingerprinting/RFPTargets.inc resistFingerprinting has also some hidden settings. If you want to protect the window size, The +/- syntax will also need some infrastructure changes so ffprofile items can add/remove strings from the same firefox-config item. |
https://bugzilla.mozilla.org/show_bug.cgi?id=1308340
The text was updated successfully, but these errors were encountered: