Re: [Tails-dev] Tor vs Tails browser fingerprint

Delete this message

Reply to this message
Autore: intrigeri
Data:  
To: Asdf Zxcv, frontdesk@torproject.org
CC: tails-dev
Oggetto: Re: [Tails-dev] Tor vs Tails browser fingerprint
Hi,

Asdf Zxcv (2022-03-10):
> The regular Tor Browser Bundle contains HTTPS Everywhere and NoScript as
> extensions by default. The Tails OS version of the Tor Browser contains an
> extra extension called Ublock Origin, which blocks ads.
>
> The issue here is that Tails users would have a different browser
> fingerprint from other Tor users, and this is a serious problem, because
> the overall Tails userbase is orders of magnitude smaller than the overall
> Tor userbase, making this a highly unique fingerprint.
>
> Either the Tor devs should add Ublock Origin to the browser, or the Tails
> devs should remove it.


This has been discussed numerous times in the past.
The status quo reflects the conclusions of these discussions.

I see no new information in your message that would encourage
me to start this discussion again.

> This difference between the two browsers is not acceptable,


It might help if you explained in which threat model this applies.
Even better if you explain how it matters to our personas:
https://tails.boum.org/contribute/personas/

Cheers!