Tor Private Mode leaks TZ info, screen resolution, much more fingerprinting data

NOTE: Any “one-liner” or topics requesting support or reporting bugs that do not make an effort to include as much of this information as possible will not be responded to. Repeatedly posting as such is grounds for banning._
Please try to adhere to this template when reporting bugs. If you think you don’t need to fill out every section in the template fill out as much of it as you can and please be as descriptive as possible when posting.
<---------Delete this line and everything above before posting---------->

Description of the issue:

At this test site to see what is leaked about the user/browser, you can see that the user’s originating timezone and screen resolution are able to be known.

Steps to Reproduce (add as many as necessary): 1. 2. 3.
Go here in Brave, release, nightly, etc.

Actual Result (gifs and screenshots are welcome!):
Your TZ, screen resolution, and a slew of other properties are exposed (GPU, etc)

Expected result:
Randomized or false TZ information should be shared with the testing site, along with randomized or slightly modified resolution information and other information.

Operating System and Brave Version(See the About Brave page in the main menu):

Version 1.23.13 Chromium: 89.0.4389.72 (Official Build) nightly (64-bit)

Additional Information:

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.