New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Beacon API - don't bother? #1586
Comments
This is the same argument Mozilla made for why they would keep the API and why it would be default enabled (not going to bother to look it up). If it's not that important, then why not get rid of it? so did you check the entire internet and discover that no-one uses beacon without the other "elsewhere" There's a big difference between scratching your ass and digging a huge hole in it. Let's not give away "free easy stuff"
I don't see how
Really, seriously? Fuck those two sites then |
also: see 40783#note_2854455 and pierov's comment in bold (while it lasts)
FYI: it's the only item in navigator that we disable - easily discerned. But of course we're not going to beat advanced scripts in FF |
MDN says:
there's also more in the w3 link, specifically:
it's an async way to do something websites can do anyway, just in a sync manner (hence impacting performance). I think that's what mozilla also meant when they told you "no net gain": it's not that by disabling the API that information becomes unavailable. but I'm curious to hear what you and eventually pierov think of it, it's totally possible I'm missing something obvious. |
I'll reopen as a reminder, not as a sign that I'm going to change it. I am of the firm position that disabling it removes most of it (since the alternatives are as per the MDN link: legacy and wonky) perf: OK, but I doubt you would even notice it because it's disabled so nothing is trying to be sent (because the alt methods are legacy and problematic): especially with uBO blocking tracking and analytic scripts anyway |
so according to ma1 there's no specific threat (and TB blocks it already via NS) and the next comment kinda sums it up
The bold is mine. So what is so important about the unload event that it gains? For analytics I get it. Anything "evil" here is probably already collected (and sent), unless I'm missing something. Maybe a link click to open in the same class, discuss |
I think ma1 is spot on and I vote for my proposal 🙋♂️ |
For what it's worth, see comment 6:
|
Yup, read that before - good reference. I don't agree with the last paragraph much, now that four or five years have passed. I think most sites have stripped out the older methods. I liken this to 3p site data: oooh we need to block it .. no we don't, we have partitioning (and sanitizing). This is much the same, as in the proper solution lies elsewhere - a bit like referrers: not the best example, but if you are masking your IP, then the data is useless - you're just the same as any other user of that page (not to be confused with linkability of cross-site traffic via navigational tracking) I still think beacon is a solution: just not a complete one |
lols - |
oh look the spec has a list of Beacon alternatives that devs can use -> https://github.com/WICG/pending-beacon#problem-and-motivation |
Examples: https://vexell.ru/files/testpool/ |
- fixup pop-up thanks @Tiagoquix - remove beacon see #1586 - remove region prefs: note: the search.region pref has been inactive since at least 102, so removing entirely - which is good, because we shouldn't be resetting it with prefsCleaner anyway see #1590
From what I can tell, Tor enables the API, but silently discards any data that trackers try to leak through it. Is this not feasible for Arkenfox? |
^ read the thread - it already says that NS does this There is also no real threat here as anything useful can already be sent without beacon |
A key difference is visibility. I can open the inspector tab and see HTTP requests made by a page, but these |
that has nothing to do with the threat |
What threat?
|
you tell me - you started this up again by asking if arkenfox could do something - so clearly you must have a reason. If there is no threat then why did you ask? |
I think we should get rid of
2602
, the analytics it can deliver can be obtained and shared elsewhere so there's no net gain; on the flip side, it might impact performance and we had a couple reports of breakage in the past.bonus: one less flip, one less API disabled, arguable fingerprint gain.
sources:
The text was updated successfully, but these errors were encountered: