[tor-bugs] #22548 [Applications/Tor Browser]: Firefox downgrades VP9 videos to VP8 when measured performance is not enough

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Oct 19 14:28:09 UTC 2018


#22548: Firefox downgrades VP9 videos to VP8 when measured performance is not
enough
-------------------------------------------------+-------------------------
 Reporter:  cypherpunks                          |          Owner:  tbb-
                                                 |  team
     Type:  defect                               |         Status:  closed
 Priority:  Medium                               |      Milestone:
Component:  Applications/Tor Browser             |        Version:
 Severity:  Normal                               |     Resolution:  fixed
 Keywords:  tbb-fingerprinting,                  |  Actual Points:
  TorBrowserTeam201801R                          |
Parent ID:                                       |         Points:
 Reviewer:                                       |        Sponsor:
-------------------------------------------------+-------------------------

Comment (by vp9):

 Replying to [comment:18 tom]:
 > A few notes. I reviewed mozilla-central and -esr52.
 Now it's time for -esr60. And -esr68 will need a new patch.
 > 0: I agree, this is a hardware fingerprinting vector (albeit a small
 one, 1 bit of info). We should set the pref either very high (disabling
 VP9 for everyone) or to 0 (enabling it for everyone). Telemetry indicates
 more users fall below the 150 fps choice than above
 Maybe, that's because it varies between 29-179 on a relatively fast CPU?
 > 1: The correct place to put prefs is browser/app/profile/000-tor-
 browser.js It's best to keep the prefs all in one place. (Also see #4)
 And revisit them during rebasing.
 > 2: Setting the pref does not enable vp9 on Android. That's probably
 fine, since all Androids will be hardcoded to false (no fingerprinting)
 and the point of disabling vp9 there is because it's not fast enough for
 phones.  (True for -central and esr)
 What do Android users think about it?
 > 3: Setting the pref doesn't enable it on Macs. Same problem, except Macs
 are hardcoded false because it spins up the fan and annoys people. (Only
 true for central) Maybe this #ifdef should be backported to esr52 for TB?
 If it is I think it should be a separate commit/patch to make rebasing
 easier (on rebase we can just drop the individual patch entirely.)
 Disabling vp9 and adding a fingerprinting vector just because of the fan?!
 Why is this true for Tor Browser?
 > 4: The benchmark is skipped correctly when the pref is set manually.
 However, setting the pref in all.js means the pref won't have a user
 value, and the benchmark will be run. That's bad, so that's two reasons it
 should be in 000-tor-browser.js
 That's bad. And the benchmark will be run on every update anyway.
 > 5: I assume, but never verified, that prefs set in 000-tor-browser.js
 are considered to 'have a user value'.
 Probably, no.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/22548#comment:27>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list