-
Notifications
You must be signed in to change notification settings - Fork 2.6k
Stop modifying WebRTC Web APIs when fingerprinting protection=strict #11310
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Are you sure? https://browserleaks.com/webrtc |
@cjwijtmans sorry, im not sure I follow your question. Can you try rephrasing? |
Because its clear webrtc is used in multiple ways to fingerprint. I was actually surprised on android brave browser it was able to pull up wan and lan ip adress which will work even on vpn. At this point i dont even trust brave. |
Sure, understood. I'm not following the connection to this issue though. This issue is specifically not about getting IP information from the WebRTC system (which is already controlled through a global shields setting). This is about whether you can get fingerprinting information through these methods unrelated to ip addresses. |
Predicted your response, anyway. All i said is that currently even the wan and lan information can be used for some basic fingerprinting making VPNs useless. Are you completely ignoring device id enumaration? There is a reason webrtc is rendered useless, its a huge privacy leak. Do you even know what are you talking about? No wonder random privacy filters and fingerprinting plugins are doing a better job than brave currently. |
These comments are not related to the issue here, so I will not respond further. For anyone else who comes across this, device enumeration fingerprinting is being handled in #8666. WAN and LAN IP information is already handled through other shields settings. This issue is not related to either of those topics. |
For a QA plan, all thats needed is to go to https://browserleaks.com/webrtc and make sure that you see the public (not local) IP when fingerprinting = strict |
Verified passed with
Verification passed on
Verification passed on
|
Verification passed on OnePlus 6T with Android 10 running 1.14.82 x64 RC build
Verification passed on Samsung Tab A with Android 10 running 1.14.82 x64 RC build
Verification passed on Nexus 6P Emulator with Android 7 running 1.14.82 x86 RC build
|
Right now, if you set fingerprinting protections to strict, the following JS APIs are removed or rendered useless:
These APIs are not fingerprinting related; this implementation is largely because Brave used to use the fingerprinting setting to control a number of non-fp related things too (to avoid jamming up the shields UI).
We should stop modifying these methods based on fingerprinting setting, and rely on the global WebRTC setting to control the privacy properties of these methods
The text was updated successfully, but these errors were encountered: