mullvad / mullvad-browser

Privacy-focused browser for Linux, macOS and Windows. Made in collaboration between @torproject and @mullvad
https://mullvad.net/browser
1.2k stars 22 forks source link

Total Cookie Protection& Multi-Account Containers #66

Open ruihildt opened 1 year ago

ruihildt commented 1 year ago

As far as I see, Mullvad Browser currently doesn't currently use Total Cookie Protection (network.cookie.cookieBehavior & network.cookie.cookieBehavior.pbmode are set to 1 instead of 5). Are there any downsides of enabling Total Cookie Protection in contrast to Mullvad Browser's current default setting of blocking all third-party cookies?

Mozilla has an article about Total Cookie Protection & Multi-Account Containers: https://blog.mozilla.org/en/products/firefox/extensions-addons/how-firefoxs-total-cookie-protection-and-container-extensions-work-together/ To me it sounds like Multi-Account Containers don't have any general privacy benefits over Total Cookie Protection like @ph00lt0 already said unless you want to separate sessions on the same domain, which is a likely a rarer case.

Is it safe to enable Total Cookie Protection (network.cookie.cookieBehavior = 5) right now as a user on Mullvad Browser or is that fingerprintable somehow?

If I've interpreted this all right, I'd say Multi-Account Containers definitely shouldn't be preinstalled but a recommended could be made with an explanation about what benefits it actually gives over Total Cookie Protection (once adopted). This issue can also be solved with browser profiles to a degree.

Originally posted by @felschr in https://github.com/mullvad/browser-extension/issues/23#issuecomment-1510451811

Thorin-Oakenpants commented 9 months ago

some answers/info

FYI: and ETP standard/strict controls this

// 0 = Accept cookies and site data
// 1 = (Block) All third-party cookies
// 2 = (Block) All cookies
// 3 = (Block) Cookies from unvisited websites
// 4 = (Block) Cross-site tracking cookies (default)
// 5 = (Isolate All) Cross-site cookies (TCP: Total Cookie Protection / dFPI: dynamic FPI) [1] (FF86+)
user_pref("network.cookie.cookieBehavior", 1);
Thorin-Oakenpants commented 9 months ago

updated value above (sorry, I pasted an older description that was missing value 5)

Value 5 uses dFPI. TB/MB do not use dFPI, it uses FPI which is completely different engineering (i.e it's not even dFPI minus the d part). And we set user_pref("privacy.firstparty.isolate", true); which in code disables dFPI.

No one has bothered to check out the ramifications of all this, since it's not supported and not envisaged that users would do it (we hid the UI for a reason)

tl;dr: don't play with prefs in about:config