This repository has been archived by the owner on Dec 11, 2019. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 973
WebRTC not fully disabled with Tor #14091
Labels
Milestone
Comments
What we automatically block in private tabs with Tor enabled is only the WebRTC IP leak. We do not automatically block all (first-party) fingerprinting, but if you enable that in shields, then (some?) WebRTC fingerprinting methods are blocked. (Third-party fingerprinting is blocked by default.) |
if we turned on #13735, it would also block device enumerator in tor tabs |
i think this is actually fixed with #14402 |
10 tasks
kjozwiak
added
QA/test-plan-specified
release-notes/exclude
and removed
QA/test-plan-required
labels
Jun 25, 2018
This was referenced Jun 25, 2018
Verified on Windows 10 x64 using
Verified with macOS 10.12.6 using
Verified on
|
This was referenced Jun 25, 2018
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Labels
Test Plan
0.23.x
build that includes Torhttps://browserleaks.com/webrtc
within a Tor PTDevice Enumeration
,Has Microphone
,Has Camera
andMedia Devices
Device Enumeration
,Has Microphone
,Has Camera
andMedia Devices
See an example of a failing example via the screenshot @flamsmark added into the original issue.
Original Bug
In a private tab with Tor, it doesn't look like WebRTC is fully disabled. Visiting https://browserleaks.com/webrtc with default shields settings caused Brave to access my webcam drivers and then expose a list of A/V devices to the site. IP address doesn't seem to have been exposed.
Related: #13397.
I'm using the test build with Tor available for private tabs.
Brave: 0.23.2
V8: 6.6.346.26
rev: c09cbf6
Muon: 6.1.0
OS Release: 17.5.0
Update Channel: Developer
OS Architecture: x64
OS Platform: macOS
Node.js: 7.9.0
Brave Sync: v1.4.2
libchromiumcontent: 66.0.3359.139
The text was updated successfully, but these errors were encountered: