-
Notifications
You must be signed in to change notification settings - Fork 420
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GPO wishlist: Fingerprinting #119
Comments
We have a preferences that resists fingerprinting. I'll check into how many of these it affects. We are looking into turning off geo completely. You shouldn't then need to set the other prefs since it is disabled. I'm unclear as to why you would change timeout values? Resist fingerprinting definitely turns off media.video_stats.enabled. I think of lot of these options are changed via the fingerprinting pref and a lot are unnecessary. |
All settings where collected over several years so maybe some are unnecessary over the years and some maybe not wise. I did not try to get to the bottom of all settings and recommendations. The dom.min_timeout_values is from https://www.privacy-handbuch.de/handbuch_21n.htm
|
I previously set beacon.enabled to false. Years ago. I still don't know what it is for. browser.send_pings? Never even heard of it :-( |
I've been following RFP closely for a long long time: arkenfox/user.js#7 is a handy list of everything RFP touches. Note: not all RFP patches are the same - their approach may differ (eg instead of disabling an API/feature as per a pref, instead they limit or spoof the returned values) etc. From the above list: 🔻 not needed / ignore
🔻 do not use if you have RFP=true You can compromise RFP - i.e your fingerprint would differ. See this issue for a look at some of the earlier RFP items and how they can be affected by and/or differ from other prefs. Below I am just looking at the individual effects, not when you combine them. Each RFP patch would need to be looked at individually to determine which wins over the other (but disabling the API usually wins over RFP).
🔻 doesn't matter (same effect)
🔻 fyi: planned for RFP
🔺 leaves the following
Sorry for the long post, but OP made me do it :) |
I honestly don't see fingerprinting as something that interesting from a GPO perspective, so I won't be placing a high priority on this. If anything, fingerprinting can create problems for enterprises. See: https://bugzilla.mozilla.org/show_bug.cgi?id=1426232 AutoConfig will continue to be available to set these preferences. |
It can create problems for any release branch. RFP is not front facing for reason.
Agreed. Otherwise you'll end up with a thousand policy items, and a PITA to maintain it all
I actually think it's a great pref to include (once it is front facing) as it reduces the
Tried to save you some time. I was just pointing out the prefs in OP, that some were deprecated, that some (most) are not needed with RFP, and that some actually alter your fingerprint with RFP (even more reason to not use them). Anyway, truck on. Hope my input helped |
@Thorin-Oakenpants Your input was great. I really appreciate it. And yes, I will probably include the actual fingerprinting pref, but not any of the individual prefs. My comments were more to the original reports. And I appreciate the details you put into your ghacks user.js documentation. |
You certainly helped me! Would I be able to find out things like this myself? If one searches for a preference you mostly get outdated pages and documentation. Is there somewhere in the code I should look? |
@jjurkus .. well, we just so happened to have someone come dump 564 prefs at us (please don't do this to PS: we've mapped Mozilla's DNA multiple times, and dug out the important stuff for privacy/security/tracking/anti-FP'ing etc (excluding most of those that are best at default) - so anyway, out of FF60's 3261 prefs, we have 469 of those (i.e relevant to FF60, I've excluded everything else) documented/covered in our user.js, and over 250 links for those prefs to relevant docs etc If you want any more help, start a new topic etc at our repo, rather than get OT here |
Thank you so much. Now I can open some new issues with stuff that is in my autoconfig and still relevant.
That's the https://github.com/earthlng/FFprefs-diffs right? |
@jjurkus - this repo: https://github.com/ghacksuserjs/ghacks-user.js |
I don't consider these enterprise specific features and hence not candidates for policies. You can continue to set them via AutoConfig. I will look at adding the fingerprinting pref to policies. |
Please implement the following GPO settings:
lockPref("beacon.enabled", false);
lockPref("browser.send_pings", false);
lockPref("browser.search.geoip.timeout", 1);
lockPref("browser.search.geoip.url", "");
lockPref("device.sensors.enabled", false);
lockPref("dom.battery.enabled", false);
lockPref("dom.enable_performance", false);
lockPref("dom.enable_resource_timing", false);
lockPref("dom.enable_user_timing", false); // exists?
lockPref("dom.event.clipboardevents.enabled", false);
lockPref("dom.network.enabled", false);
lockPref("dom.min_timeout_value", 400);
lockPref("geo.enabled", false);
lockPref("geo.wifi.logging.enabled", false); // exists?
lockPref("geo.wifi.uri", "");
lockPref("media.video_stats.enabled", false);
(I am not sure if all these settings affect something with the newest ESR, but hopefully you can enlighten me :-).)
The text was updated successfully, but these errors were encountered: