As ip-check.info states, this is equal to legacy/trac#21756 (moved) in tracking aspect. So, no problem to enable it.
Also torbutton requires some clean up, as it still uses privacy.thirdparty.isolate, resulting in:
switch (data) { case "network.cookie.cookieBehavior": var val = m_tb_prefs.getIntPref("network.cookie.cookieBehavior"); var block_thirdparty = m_tb_prefs.getIntPref("privacy.thirdparty.isolate") !== 0; if (val == 0 && block_thirdparty) // Allow all cookies m_tb_prefs.setIntPref("privacy.thirdparty.isolate", 0); else if (val == 1 && !block_thirdparty) // Block third party cookies m_tb_prefs.setIntPref("privacy.thirdparty.isolate", 2); break; case "privacy.thirdparty.isolate": torbutton_update_thirdparty_prefs(); break;
I was tempted to move this into our first 7.5 alpha build but it seems to me we might want to have some easy way to inspect the cookie isolation. Or do we have that already and I am just not aware of that? The browser UI is still broken it seems (see: legacy/trac#10353 (moved)).
pastly mentioned on IRC that Tor Browser does not protect against https://robinlinus.github.io/socialmedia-leak/ if we allow third-party cookies. But I think it should if third-party cookies are really the means to track users across origins. We need to investigate that more thoroughly before flipping the switch.
[18:08:23] <pastly> Some guy that was really really sure of himself keptasserting that '3rd party' cookies aren't always third party or couldsomehow still be sent depending on special flags in a JavaScript requestfunction. Idk. I made a PoC and tested with FF, Chrome, and TB. But thinkfound that JS func and gave up trying to figure out if I was right or if hewas right.[18:08:47] <pastly> s/But think found/but then I found/[18:09:40] <pastly>https://developer.mozilla.org/en-US/docs/Web/API/XMLHttpRequest/withCredentials[18:10:08] <pastly> I guess it allows 3rd party cookies to be sent as longas the sites are colluding with Access-Control-Allow-Origin[18:11:00] <ANON> I would guess that an ad site might ask the browserto request the first party site in such a way that passes information suchthat the first party deposits a cookie that contains information from thead site.[18:11:28] <ANON> is that what ACAO does?[18:11:41] <pastly> Dunno. I stopped thinking about it. :p
@gk do you have any insight into why this was never updated and why we are (apparently) blockinfg 3rd party cookies? It was my understanding that the whole point of first party isolation was that 3rd party cookies would be double-keyd w/ the first party...
@gk do you have any insight into why this was never updated and why we are (apparently) blockinfg 3rd party cookies? It was my understanding that the whole point of first party isolation was that 3rd party cookies would be double-keyd w/ the first party...
That is right, third party cookies are double-keyed and thus, we could flip the switch this ticket is for. However, what made us pause back then in 2019 is some study Mozilla folks did where they, somewhat surprisingly, realized that more websites are broken if you double-key third party cookies and allow them than outright disabling third party cookies. It seems at least in 2019 websites were somewhat "used" to handle disabled 3rd party cookies but not double-keying them (which boils down to a loss in functionality while suggesting those cookies are supposed to work).
Not sure what the situation looks like 2022/2023. :)