Skip to content
GitLab
Projects Groups Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • Tor Browser Tor Browser
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 832
    • Issues 832
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 4
    • Merge requests 4
  • Deployments
    • Deployments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • Repository
  • Wiki
    • Wiki
  • Activity
  • Graph
  • Create a new issue
  • Commits
  • Issue Boards
Collapse sidebar
  • The Tor Project
  • Applications
  • Tor BrowserTor Browser
  • Issues
  • #33003
Closed
Open
Issue created Jan 20, 2020 by cypherpunks@cypherpunks

Tor browser / Firefox telemetry data

https://seclists.org/fulldisclosure/2019/May/17

It seems this issue is still not fixed although it has been announced in May 2019. URLs containing "mozilla", "google" etc. (as described) can still be found in about:config

This is well known in Firefox and there are various user.js projects which eliminate background connections.

Although in the case of Tor Browser the IP address is anonymized this is still unacceptable, especially for a browser which claims to be focused on protecting privacy.

As a privacy focused user: I expect 0 (zero) background connections and no possibility to enable such (through preferences or through about:config).

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking