[tbb-bugs] #13026 [Tor Browser]: Verify screenX and screenY are spoofed sanely

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Sep 2 12:01:06 UTC 2014

#13026: Verify screenX and screenY are spoofed sanely
     Reporter:           |      Owner:  tbb-team
  mikeperry              |     Status:  new
         Type:  defect   |  Milestone:
     Priority:  major    |    Version:
    Component:  Tor      |   Keywords:  ff31-esr, tbb-easy, tbb-testcase,
  Browser                |  tbb-fingerprinting, TorBrowserTeam201409Easy
   Resolution:           |  Parent ID:
Actual Points:           |
       Points:           |

Comment (by gacar):

 Checking the relevant Mozilla bug
 [https://bugzilla.mozilla.org/show_bug.cgi?id=943668 #943668] and
 [https://hg.mozilla.org/releases/mozilla-aurora/rev/5b7edf143247 landed FF
 patch], it seems
 and-w.patch existing TBB patch #0021] is still ok but needs to be updated
 for ESR31 to cover this new method: [https://mxr.mozilla.org/mozilla-
 esr31/source/dom/base/nsGlobalWindow.cpp#4991 nsGlobalWindow::GetScreenXY]

 For the device/CSS pixel difference, TBB bluntly returns 0 from the
 methods changed in the Firefox's patch (`GetScreenX, GetScreenY`). So I
 guess it should be ok.

Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13026#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online

More information about the tbb-bugs mailing list