On Wednesday 2018-01-10 12:40 -0600, Tom Ritter wrote:
> When Resist Fingerprinting is enabled, we display a permission prompt
> when a website tries to access the rendered canvas data. This is
> because canvas rendering is a popular fingerprinting and tracking
> vector on the web.

Is stopping canvas fingerprinting actually a substantial reduction
in available entropy, or is it just removing a convenient source
that happens to combine a bunch of sources of entropy that are also
available elsewhere (such as OS and major version, browser version,
available fonts, and some characteristics of the graphics hardware
and drivers, although some of the latter might not be fully
available elsewhere)?

(I ask this because I think it's more useful to work on privacy
protections that work at scale and against determined adversaries,
than ones that work only when they're used by a small number of
users because if they would be used by more users then sites would
work around the protection.)

> However, some uses of this technique are not actually malicious -
> they're doing feature detection (emoji suppot may be the most popular
> instance of this.) This has actually hit even us: we throw the prompt
> on blog.mozilla.org
> https://bugzilla.mozilla.org/show_bug.cgi?id=1413182
> 
> The people behind this emoji detecting this is Wordpress, and they
> agree: this prompt is annoying. They would like to not show it (and
> assume emoji support is missing.) But they don't have a way to ask
> "Hey, will the browser let me read canvas pixel data?"
> 
> This proposal is that. Add a permission 'canvas-imagedata' that will
> return 'granted' when Resist Fingerprinting mode is disabled, and
> 'prompt' when RP is enabled and appropriate.

In Resist Fingerprinting mode, could it sometimes return all 3
states (granted, prompt, denied) depending on whether the user had
chosen to remember the decision from a prior prompt?  Or is there no
such memory?

> Is this feature enabled by default in sandboxed iframes? Yes.
> 
> In general, I think nested permissions are a bad idea, and we should
> block them, but that's a whole different discussion.  See
> https://bugzilla.mozilla.org/show_bug.cgi?id=1414164

I think there's been some discussion in other forums about moving to
a model (at least for new permissions) where:

 * permissions apply to the toplevel document by default, but not to
   subframes within it

 * there's an API that allows the toplevel document to delegate one
   of its permissions to a frame inside of it (which could be done
   recursively).  (I think the proposed way of doing this was
   https://wicg.github.io/feature-policy/ although I'm not sure if
   I'm remembering correctly.)

-David

-- 
𝄞   L. David Baron                         http://dbaron.org/   𝄂
𝄢   Mozilla                          https://www.mozilla.org/   𝄂
             Before I built a wall I'd ask to know
             What I was walling in or walling out,
             And to whom I was like to give offense.
               - Robert Frost, Mending Wall (1914)

Attachment: signature.asc
Description: PGP signature

_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to