arkenfox / user.js

Firefox privacy, security and anti-tracking: a comprehensive user.js template for configuration and hardening
MIT License
10.24k stars 518 forks source link

sticky: test sites #6

Closed Thorin-Oakenpants closed 4 years ago

Thorin-Oakenpants commented 7 years ago

snip

earthlng commented 7 years ago

It only checks the following protocol handlers, all of which you probably don't have and therefore it fails in all your tested browsers.

    var protocols = {
    "znzbadbfasdf" : "asdf", // bogus test
    "smb" : "GNOME support",
    "sftp" : "GNOME support",
    "addbkmrk" : "RefSpoof",
    "httpmod" : "RefSpoof",
    "hxxp" : "RefSpoof",
//  "spoof" : "RefSpoof", // tries to spoof
    "spoofx" : "RefSpoof",
//  "custombutton" : "CustomButton", // generates error
    "chm" : "chm reader",
    "glue" : "Glue",
    "wikipedia" : "Zipedia",
    "boox" : "Boox",
    "ubiquity" : "Ubiquity",
    "relative" : "FoxyProxy",
    };
Gitoffthelawn commented 7 years ago

Using http://www.html-kit.com/tools/cookietester/ I just discovered that all Private Browsing windows share the same cookies.

IOW, if you have one Private Browsing window open, and then open another Private Browsing window, the new Private Browsing window shares all the data with the other Private Browsing window. It would be so much more useful if each Private Browsing window had its own privacy sandbox.

Gitoffthelawn commented 7 years ago

Came across this: http://cs1.ca/ttest/dump.html

What do you think?

nodiscc commented 7 years ago

@Gitoffthelawn this looks interesting but it doesn't report my own actual config values. Is it supposed to do so? Is there more context to this test page?

earthlng commented 7 years ago

Look at the source code guys xD no-resource-uri addon is what blocks this

Gitoffthelawn commented 7 years ago

@nodiscc I found it in the description on this page: https://addons.mozilla.org/firefox/addon/no-resource-uri-leak/

It's interesting that it isn't reporting your actual values. Maybe try a fresh test profile?

Atavic commented 7 years ago

@Gitoffthelawn I get this: tortype = 0

ghost commented 7 years ago

I'm not really sure if this is the best thread to share a site which proposes to create an ad hoc Firefox profile based on the user's preferences: Firefox Profilemaker.

I've tried it but I have to say the settings are excessively rudimentary.

Atavic commented 6 years ago

Privoxy https://github.com/ghacksuserjs/ghacks-user.js/issues/6#issuecomment-343989292 doesn't eat so much here, maybe it's your OS battling with it?

Google S2 Shared Stuff

publicarray commented 6 years ago

http://webkay.robinlinus.com/ It's from the same guy that made ubercookie, not much new here but I like the design.

Atavic commented 6 years ago

https://people.torproject.org/~brade/tests/canvasTest.html :feelsgood:

Atavic commented 6 years ago

I propose the canvas test above. Blindly clicking everything I got the expected results:

3/3 tests passed ... expected true, got true expected false, got false

While the currently listed test Canvas Blocking Detection leaves me on a blank page with some text.

Gitoffthelawn commented 6 years ago

@Atavic I didn't have time to look too closely at it, but Firefox 58.0b4 passed all the tests (4/4) without any canvas extensions installed. Not sure exactly how to interpret those results.

claustromaniac commented 6 years ago

@Gitoffthelawn Isn't FF 58 with privacy.resistFingerprinting=true supposed to deal with canvas? See #7

Atavic commented 6 years ago

On testpage here I see no images in the Destination slots, so canvas isn't working.

Gitoffthelawn commented 6 years ago

@claustromaniac IIRC, yes. But I tested it with privacy.resistFingerprinting=false

2glops commented 6 years ago

I understant that, people.torproject detect if canvas is working or not, kkapsner shows if canvasblocker can be detected by websites.

Passed all tests on first site and CB is detected only by: function length: CB detected known pixel value test 10: CB detected

Linux FF57 with privacy.resistFingerprinting=true

Atavic commented 6 years ago

https://browseraudit.com

Gitoffthelawn commented 6 years ago

@Atavic Excellent find. I hope Mozilla takes a look at it, because there are a couple things revealed that are likely Firefox bugs.

Atavic commented 6 years ago

As found @ Wilders Security Forum. Search for browseraudit discussion if interested.

Gitoffthelawn commented 6 years ago

@Thorin-Oakenpants What were your results in FF (and which FF version)?

Atavic commented 6 years ago

Welcome to FP Central!

This website aims at studying the diversity of browser fingerprints and providing developers with data to help them design good defenses.

Pretty epic research, from simple charts, as:

Lang. EN 59% RU 26,2%

...to very deep custom searches.

Kraxys commented 5 years ago

2 sites for testing storage cleaning apps or addons:

https://www.hotcleaner.com/cleaning-software-test.html https://demo.agektmr.com/storage/

Gitoffthelawn commented 5 years ago

DCSec - https://cc.dcsec.uni-hannover.de/

TLS/SSL Certificate invalid.

Symantec - https://cryptoreport.websecurity.symantec.com/checker/views/sslCheck.jsp

Not available.

polcak commented 5 years ago

https://blog.skylined.nl/LocalNetworkScanner/ scans local network using cross-origin XHR requests

polcak commented 5 years ago

@Thorin-Oakenpants: WebRTC leaks local IP address. Then cross-origin XHR scans the local network to detect active devices, see https://blog.skylined.nl/LocalNetworkScanner/fXHRScanIPAddressPorts.js.