Closed
Description
Upon reviewing the EFF's Panopticlick tool Mozilla found that the greatest source of browser fingerprinting risk is the list of plugins. Mozilla's recommendation at the time to mitigate the vulnerability was to set plugins.enumerable_names=""
which would make the browser return undefined
if JavaScript queried the list of installed plugins.
Earlier this year though, Mozilla backtracked and the browser removed and started ignoring this setting. The vulnerability returned.
On another bugzilla page, someone has recently suggested a workaround:
Object.defineProperty(navigator, "plugins", { value: [ /* non-enumerable whitelist of plugins whose names are not detailed/fingerprintable */ ]});
So I have 2 questions:
- Does preventing plugin fingerprinting fit uBO's mission to protect users' privacy?
- Would the suggestion work?
Metadata
Metadata
Assignees
Labels
No labels
Activity