Closed Bug 1708593 Opened 4 years ago Closed 2 years ago

Enhance resist fingerprinting: Disable web audio (API) by default when privacy.resistFingerprinting is enabled

Categories

(Core :: Security, enhancement)

enhancement

Tracking

()

RESOLVED WONTFIX

People

(Reporter: Tom25519, Unassigned)

References

(Blocks 1 open bug)

Details

User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Firefox/78.0

Steps to reproduce:

I set privacy.resistFingerprinting to true in about:config, and did a test on https://coveryourtracks.eff.org

Actual results:

When web audio is enabled (dom.webaudio.enabled=true), the result is:

AudioContext fingerprint
35.7383295930922

Bits of identifying information: 2.73
One in x browsers have this value: 6.63

When it disabled (dom.webaudio.enabled=false), the result is:

AudioContext fingerprint
not available

Expected results:

dom.webaudio.enabled should be set to false when privacy.resistFingerprinting is enabled

I prefer randomize the fingerprint (if possible) rather than disable the web audio (API).

The Bugbug bot thinks this bug should belong to the 'Core::Web Audio' component, and is moving the bug to that component. Please revert this change in case you think the bot is wrong.

Component: Untriaged → Web Audio
Product: Firefox → Core
Type: defect → enhancement
Component: Web Audio → Security

Tom, is there already a bug for Web Audio + RFP?

Flags: needinfo?(tom)

(In reply to Johann Hofmann [:johannh] from comment #3)

Tom, is there already a bug for Web Audio + RFP?

No, I couldn't search a exiting bug with webaudio + fingerprinting.

There is not actually. It, along with the Math leakage I suppose, are well known enough to us that we never filed a bug.

Tor has not chosen to disable it; so we would not do that unless they wanted to change the behavior. Randomizing the calculations would not be effective unless we also randomized the underlying Math algorithms (sin(), tan(), etc)

I think it would be more valuable to ship a fixed floating point library for Tor Browser to use than to do the randomization, personally, but I'm afraid neither is something we have bandwidth to work on at the moment.

Flags: needinfo?(tom)

(In reply to Tom Ritter [:tjr] (ni? for response to sec-[advisories/bounties/ratings/cves]) from comment #5)

Tor has not chosen to disable it

I think that's a typo. Tor Browser set dom.webaudio.enabled to false

In terms of Firefox, I think for now that enforcing disablement of webaudio is not needed, and creates more problems that solutions. For example, it would break video conferencing. Canvas does as well, but at least that has a site exception.

The entropy from audio (a limited set and range of math functions) and math is not huge: not that we shouldn't do something about it. Can steven or someone run an experiment to gauge how many distinct values there are and what possible equivalency exists: in all my tests I've only ever seen two audio results (not counting audioContext keys) across all browsers. Or maybe set one up on ritter.vg and ask for submits: note some audio tests require user gestures

Because we will be fixing the webaudio fingerprint in Bug 1358149, I do not think we need to do this.

Status: UNCONFIRMED → RESOLVED
Closed: 2 years ago
Resolution: --- → WONTFIX
You need to log in before you can comment on or make changes to this bug.