[tor-bugs] #26602 [Applications/Tor Browser]: investigate whether CSS clip-path adds a fingerprinting risk

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Jul 2 14:44:41 UTC 2018


#26602: investigate whether CSS clip-path adds a fingerprinting risk
-------------------------------------+-------------------------------------
     Reporter:  mcs                  |      Owner:  tbb-team
         Type:  defect               |     Status:  new
     Priority:  Medium               |  Milestone:
    Component:  Applications/Tor     |    Version:
  Browser                            |   Keywords:  tbb-fingerprinting,
     Severity:  Normal               |  ff60-esr, TorBrowserTeam201807
Actual Points:                       |  Parent ID:
       Points:                       |   Reviewer:
      Sponsor:                       |
-------------------------------------+-------------------------------------
 Support for applying CSS clip-path to DOM elements was added during the
 ESR60 development cycle. We should verify that this feature does not add
 any fingerprinting risks, e.g., due to platform, OS, or GPU-specific
 behavior. See:
  ​https://developer.mozilla.org/en-US/docs/Web/CSS/clip-pathhttps://bugzilla.mozilla.org/show_bug.cgi?id=1247229

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26602>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list