[tor-bugs] #10419 [Firefox Patch Issues]: Can requests to 127.0.0.1 be used to fingerprint the browser?
Tor Bug Tracker & Wiki
blackhole at torproject.org
Wed Jan 22 01:25:19 UTC 2014
#10419: Can requests to 127.0.0.1 be used to fingerprint the browser?
--------------------------------------+--------------------------------
Reporter: mikeperry | Owner: mikeperry
Type: task | Status: new
Priority: major | Milestone:
Component: Firefox Patch Issues | Version:
Resolution: | Keywords: tbb-fingerprinting
Actual Points: | Parent ID:
Points: |
--------------------------------------+--------------------------------
Comment (by cypherpunks):
(cyperpunks2 here)
Replying to [comment:6 cypherpunks]:
> {{{
> Site LOCAL
> Accept from LOCAL
> Deny
> }}}
Interesting. That way it's safe to conveniently administer CUPS etc. from
inside Tor Browser. I like it.
With the rule already included in NoScript, TBB would only need to ship
with noscript.ABE.enabled = true.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10419#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list