[tbb-bugs] #26602 [Applications/Tor Browser]: investigate whether CSS clip-path adds a fingerprinting risk
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Jul 2 14:44:41 UTC 2018
#26602: investigate whether CSS clip-path adds a fingerprinting risk
-------------------------------------+-------------------------------------
Reporter: mcs | Owner: tbb-team
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Applications/Tor | Version:
Browser | Keywords: tbb-fingerprinting,
Severity: Normal | ff60-esr, TorBrowserTeam201807
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
-------------------------------------+-------------------------------------
Support for applying CSS clip-path to DOM elements was added during the
ESR60 development cycle. We should verify that this feature does not add
any fingerprinting risks, e.g., due to platform, OS, or GPU-specific
behavior. See:
https://developer.mozilla.org/en-US/docs/Web/CSS/clip-path
https://bugzilla.mozilla.org/show_bug.cgi?id=1247229
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26602>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tbb-bugs
mailing list