Ship Available Screen Resolution, Processor Count, and Touch Points fingerprinting resistance
Categories
(Core :: Privacy: Anti-Tracking, enhancement)
Tracking
()
People
(Reporter: tjr, Assigned: tjr)
References
(Blocks 1 open bug)
Details
Attachments
(1 file, 2 obsolete files)
This patch will enable the Available Screen Resolution and Processor Count defenses in PBM and ETP Strict on Firefox Desktop. Processor Count will be reported as 2. Available Screen Resolution will be a fixed height offset on Windows and Mac, and equal to the screen resolution on all other platforms.
The experiment results - which enabled these protections in Normal Browsing Mode also - look within normal range. The only outlier that doesn't look like a random deviation is Tab Reloads, which baseline was 4.80 to 7.72 and in the experiment branches was 5.86 to 8.78 and 5.54 to 10.59 - still I think this is just an outlier like other changes reported - I strongly doubt lying about hardware concurrency meaningfully increased user retention. We could have someone from Data review the results however.
No bug reports were found in Bugzilla or WebCompat reports.
Changes on Android will be forthcoming.
| Assignee | ||
Comment 1•3 months ago
|
||
Updated•3 months ago
|
Updated•3 months ago
|
| Assignee | ||
Comment 2•3 months ago
|
||
After discussion, we can ship all three protections to Nightly.
| Assignee | ||
Comment 3•3 months ago
|
||
Release Note Request (optional, but appreciated)
[Why is this notable]: We are shipping additional fingerprinting protections that alter the behavior of some Web APIs in certain browsing modes.
Putting this flag here to help me remember to help write a release note and edit the SUMO page
Comment 6•3 months ago
|
||
Backed out for causing bc failures on browser_fingerprintingWebCompat.
Comment 7•3 months ago
|
||
This reverts commit c5ef3944d374adb7522c146ec67930ed8738b58e.
Comment 8•3 months ago
|
||
This is something that I wanted to do for a while. In tests where we only care if a RFP target is active or not in XYZ context, we always check for the effect of that particular RFP target. In this particular case, this approach caused a conflict between ScreenAvail and ScreenAvailToResolution. Both modify screen properties, but in a different way, but we aren't interested in how they work in browser_fingerprintingWebCompat.js file. We are just interested in if it is active or not. So, in this patch, I'm exposing active RFP targets to be able check them directly instead of observing their effects.
Comment 10•2 months ago
|
||
| bugherder | ||
Comment 11•2 months ago
|
||
Hi Tom, can you please add a suggested release note for this when you get a chance? Thanks!
| Assignee | ||
Comment 12•2 months ago
|
||
I don't write release notes very often, does this fit the style?
Firefox has expanded its Fingerprinting Protection by reporting constant values for several more attributes of user's computers. More Details
Comment 14•2 months ago
|
||
Comment on attachment 9503967 [details]
Bug 1978414: Introduce activeRFPTargets and check active targets through it rather than checking for its effects. r?tjr
Revision D259226 was moved to bug 1980622. Setting attachment 9503967 [details] to obsolete.
Updated•2 months ago
|
Comment 15•2 months ago
•
|
||
Bug 1984132 benefits from spoofing to 3+ and 5+ it seems.
(Andy Leiserson from comment #6)
Withdom.maxHardwareConcurrencyset to 2, Meet auto-selects send resolution of 180p. With 3 or 4, it selects 360p. With 5, it selects 720p.
Comment 16•2 months ago
•
|
||
Copying it here because I think it is interesting (and relevant).
Interestingly, Safari, by default, does what we are doing in bug 1984333. And as an added privacy, they do 1 + random(min: 0, max: 63) based on privacy settings
Updated•1 month ago
|
Description
•