Skip to content
GitLab
Projects Groups Topics Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • Tor Browser Tor Browser
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributor statistics
    • Graph
    • Compare revisions
  • Issues 856
    • Issues 856
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 6
    • Merge requests 6
  • Deployments
    • Deployments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • Repository
  • Wiki
    • Wiki
  • Activity
  • Graph
  • Create a new issue
  • Commits
  • Issue Boards
Collapse sidebar
  • The Tor Project
  • Applications
  • Tor BrowserTor Browser
  • Issues
  • #32714
Closed
Open
Issue created Dec 10, 2019 by Georg Koppen@gkDeveloper

Investigate fingerprinting/fpi risks for Feature Policy

Feature Policy got implemented in Firefox 64ff.

Feature Policy allows websites by different means (e.g. via the Feature-Policy header) to enable/disable plethora of features providing website owners a very fine-grained control over them. We should make sure that our first-party isolation and fingerprinting resistance is not impacted by that.

This feature is only available on nightly by default as of Firefox 73 but that might change soon.

It can be controlled by two preferences, dom.security.featurePolicy.header.enabled and dom.security.featurePolicy.webidl.enabled.

Assignee
Assign to
Time tracking