In short, Tor Browser has a privacy feature that shields your browser from HTML5 Canvas Image Extraction, a technique used for browser fingerprinting.
Currently, the only way to bypass this is by slightly reducing your privacy protection. You have two options:
1. Globally disabling the feature in about:config
- To access browser settings, put
about:config
into the address bar. - Find following setting and turn it off:
privacy.resistFingerprinting.randomDataOnCanvasExtract
2. Allowing a canvas exception for specific domains
There’s now also the choice to allow a canvas exception for specific sites. It seems like this exception lasts only for the current session. To try it out:
- Look for a ‘canvas’ icon in the top-left corner of the URL bar.
- Click the icon, then select ‘Allow’.