Detail | Description |
---|---|
Mechanism | Enhanced Tracking Protection (ETP) |
Originally deployed in | 69.0 |
Latest update deployed in | June 14, 2022 |
Latest update includes | Total Cookie Protection rolled out to all users. |
User controls |
|
Firefox uses the Disconnect.me lists to establish the domains that fall under ETP measures.
Firefox utilizes the following Disconnect.me categories in ETP:
Example: If the browser sends a request to www.facebook.com
(a known tracker), no cookies would be sent with the request.
Tracking Content blocking (enabled in Private windows by default) will not just strip cookies but actually block all resource requests to domains listed in Disconnect.me.
Firefox deletes all stored site data (incl. cookies, browser storage) if the site is a known tracker and hasn’t been interacted with in the last 30 days.
Third-party cookies are blocked for classified domains.
With Total Cookie Protection, Firefox partitions storage between the site and the third-party embedded on the site.
Example: If siteA.com
tries to load a resource from siteB.com
, the latter will have access (assuming it is not on the list of known trackers) to its cookies. However, these cookies are stored in a special partition keyed between siteA.com
and siteB.com
. If a second site, such as siteC.com
loads a resource from siteB.com
, the cookies the latter will have access to will not be the same as those available when embedded via siteA.com
.
All storage is cleared (more or less) daily from origins that are known trackers and that haven’t received a top-level user interaction (including scroll) within the last 45 days. More details can be found here.
Note that domains in the Cryptomining category have all incoming requests blocked by Firefox, and thus scripts loaded from these domains will not be able to interact with first-party cookies. Similarly, domains that are both in the Fingerprinting and some other tracking category have incoming requests blocked and the downstream impact is the same.
For classified domains, localStorage
and IndexedDB
are restricted.
Example: JavaScript running in an iframe, which loads content from a known tracking domain, tries to write to localStorage
within that iframe. Firefox blocks this activity, because localStorage
is disabled in third-party context if the domain is classified as a known tracking domain.
sessionStorage
is not restricted.
With Total Cookie Protection, all browser storage is partitioned in third-party context. See the example above for more information.
All storage is cleared (more or less) daily from origins that are known trackers and that haven’t received a top-level user interaction (including scroll) within the last 45 days. More details can be found here.
Note that domains in the Cryptomining category have all incoming requests blocked by Firefox, and thus scripts loaded from these domains will not be able to interact with other first-party storage. Similarly, domains that are both in the Fingerprinting and some other tracking category have incoming requests blocked and the downstream impact is the same.
No protections against CNAME cloaking.
The default referrer policy is strict-origin-when-cross-origin
. More relaxed policies are not permitted.
If the referring URL has a tracking parameter (e.g. fbclid
), the document.referrer
string is truncated to eTLD+1.
Example: If the user browses from https://www.my.domain/purchase-page?fbclid=12345
to https://www.my.domain/home-page/
, the document.referrer
string will show just https://my.domain/
.
If the domain is in the Fingerprinting category of Disconnect.me and in one of the tracking categories (Advertising, Analytics, or Social), all third-party requests to the domain are blocked.
On macOS Firefox, the version number in the User Agent string is frozen to 10.15
to fix compatibility issues with upgrading to macOS version 11+ (Big Sur). This has obvious privacy implications as well, as the platform version is no longer useful for fingerprinting purposes.
Sample User Agent string when running Firefox 88.0.1 on macOS 11.3.1:
"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:88.0) Gecko/20100101 Firefox/88.0"