The Tor Project is turning the Tor Browser more and more to shit. As of April 16th, their Tor Browser 14.5 update removes privacy.resistFingerprinting.spoofOsInUserAgentHeader. It was bad enough when in a previous update they disabled it by default and you had to manually enable it either through a user.js config or through about:config. Now? They removed it completely and adding the pref manually does absolutely nothing. This means your OS will from here on out always be revealed and is no longer set to Windows.
Here is the issue on the Tor Project's git from 6 months ago: http://eweiibe6tdjsdprb4px6rqrzzcsi22m4koia44kc5pcjr7nec2rlxyad.onion/tpo/applications/tor-browser/-/issues/43170
And then the implementation: http://eweiibe6tdjsdprb4px6rqrzzcsi22m4koia44kc5pcjr7nec2rlxyad.onion/tpo/applications/tor-browser/-/issues/43189
Also relevant thread on dread: http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/341c93c9ae682dcedf69
Fed Project back at it again turning things to shit.
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.