[tor-bugs] #21549 [Applications/Tor Browser]: Investigate wasm for linkability/fingerprintability/disk avoidance issues

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Oct 11 14:44:20 UTC 2019


#21549: Investigate wasm for linkability/fingerprintability/disk avoidance issues
-------------------------------------------------+-------------------------
 Reporter:  gk                                   |          Owner:  tbb-
                                                 |  team
     Type:  task                                 |         Status:  new
 Priority:  Very High                            |      Milestone:
Component:  Applications/Tor Browser             |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  ff68-esr, tbb-9.0,                   |  Actual Points:
  TorBrowserTeam201910                           |
Parent ID:                                       |         Points:  1
 Reviewer:                                       |        Sponsor:
                                                 |  Sponsor44-can
-------------------------------------------------+-------------------------

Comment (by sysrqb):

 I don't see any significant fingerprinting or linkability issues in the
 wasm implementation. I don't see any caching across principals. There is a
 minor fingerprinting risk due to timing leaks (how quickly the wasm byte
 code is returned as a Module), and how quickly a wasm function is
 executed. There is the additional risk of malicious byte code exploiting a
 compiler bug. However, these seem no worse than the existing javascript
 attack surface - wasm simply adds more options.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21549#comment:32>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list