[tor-commits] [tor-browser] branch tor-browser-102.5.0esr-12.0-1 updated: fixup! Firefox preference overrides.

gitolite role git at cupani.torproject.org
Wed Nov 30 11:20:20 UTC 2022


This is an automated email from the git hooks/post-receive script.

pierov pushed a commit to branch tor-browser-102.5.0esr-12.0-1
in repository tor-browser.

The following commit(s) were added to refs/heads/tor-browser-102.5.0esr-12.0-1 by this push:
     new 731f7358532f fixup! Firefox preference overrides.
731f7358532f is described below

commit 731f7358532f91ea7ec1cd3ddc8c427146fe81f4
Author: Pier Angelo Vendrame <pierov at torproject.org>
AuthorDate: Mon Nov 28 17:42:26 2022 +0100

    fixup! Firefox preference overrides.
    
    Added a few documentation comments
---
 browser/app/profile/001-base-profile.js | 13 +++++++++++--
 1 file changed, 11 insertions(+), 2 deletions(-)

diff --git a/browser/app/profile/001-base-profile.js b/browser/app/profile/001-base-profile.js
index bfeadbbbe305..ffae2f883289 100644
--- a/browser/app/profile/001-base-profile.js
+++ b/browser/app/profile/001-base-profile.js
@@ -225,7 +225,13 @@ pref("dom.push.enabled", false);
 
 // Fingerprinting
 pref("privacy.resistFingerprinting", true);
+// tor-browser#18603: failIfMajorPerformanceCaveat is an optional attribute that
+// can be used when creating a WebGL context if the browser detects that the
+// performance would be low. That could be used to fingerpting users with a not
+// good graphics card, so disable it (actually, defense in depth, it is already
+// disabled by default from Firefox).
 pref("webgl.disable-fail-if-major-performance-caveat", true);
+// tor-browser#16404: disable until we investigate it further (#22333)
 pref("webgl.enable-webgl2", false);
 pref("browser.startup.homepage_override.buildID", "20100101");
 pref("browser.link.open_newwindow.restriction", 0); // Bug 9881: Open popups in new tabs (to avoid fullscreen popups)
@@ -271,7 +277,8 @@ pref("browser.display.use_system_colors", false);
 
 // Third party stuff
 pref("privacy.firstparty.isolate", true); // Always enforce first party isolation
-pref("privacy.partition.network_state", false); // Disable for now until audit
+// tor-browser#40123 and #40308: Disable for now until audit
+pref("privacy.partition.network_state", false);
 pref("network.cookie.cookieBehavior", 1);
 pref("network.cookie.cookieBehavior.pbmode", 1);
 pref("network.predictor.enabled", false); // Temporarily disabled. See https://bugs.torproject.org/16633
@@ -280,7 +287,9 @@ pref("network.http.speculative-parallel-limit", 0);
 pref("browser.places.speculativeConnect.enabled", false);
 pref("network.prefetch-next", false);
 pref("browser.urlbar.speculativeConnect.enabled", false);
-// Bug 40220: Make sure tracker cookie purging is disabled
+// Bug 40220: Make sure tracker cookie purging is disabled.
+// It depends on Firefox's tracking protection, which we currently do not enable
+// See also tor-browser#30939.
 pref("privacy.purge_trackers.enabled", false);
 // Do not allow cross-origin sub-resources to open HTTP authentication
 // credentials dialogs. Hardens against potential credentials phishing.

-- 
To stop receiving notification emails like this one, please contact
the administrator of this repository.


More information about the tor-commits mailing list