Closed
Bug 1871789
Opened 2 years ago
Closed 1 year ago
RFPTarget PointerEvents leaks mozPressure + mozInputSource
Categories
(Core :: DOM: Events, enhancement)
Core
DOM: Events
Tracking
()
RESOLVED
FIXED
128 Branch
Tracking | Status | |
---|---|---|
firefox128 | --- | fixed |
People
(Reporter: thorin, Assigned: fkilic)
References
(Blocks 1 open bug)
Details
Attachments
(2 files)
In Bug 1363508, among other values, we spoof pointerType
as mouse
and mozPressure
as 0.5
(when active)
the pic is from FF123 Nightly on android with RFP enabled
mozInputSource
is5
despite spoofing pointerType as mouse // mouse = 1, pen = 2, touch = 5- I get
2
when I use a pen on my laptop (RFP on)
- I get
- (active)
pressure
is0.5
butmozPressure
leaks the real value of1
edit: test is https://arkenfox.github.io/TZP/tests/pointerevent.html
Flags: needinfo?(tom)
Reporter | ||
Updated•2 years ago
|
Blocks: uplift_tor_fingerprinting
Comment 1•1 years ago
|
||
Simon, is there an upstream Tor bug about this? Or does this not affect TB for some reason?
Flags: needinfo?(tom) → needinfo?(simon.mainey)
Reporter | ||
Comment 2•1 years ago
•
|
||
edit: https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/42513 - absolutely affects TB
Flags: needinfo?(simon.mainey)
Updated•1 years ago
|
Assignee | ||
Comment 3•1 year ago
|
||
Updated•1 year ago
|
Assignee: nobody → fkilic
Status: NEW → ASSIGNED
Pushed by tritter@mozilla.com:
https://hg.mozilla.org/integration/autoland/rev/899bf6300c71
Spoof mozInputSource and mozPressure for RFP. r=tjr,webidl,smaug
Comment 5•1 year ago
|
||
bugherder |
Status: ASSIGNED → RESOLVED
Closed: 1 year ago
status-firefox128:
--- → fixed
Resolution: --- → FIXED
Target Milestone: --- → 128 Branch
You need to log in
before you can comment on or make changes to this bug.
Description
•