+0.38 Firefox to add Tor Browser anti-fingerprinting technique called letterboxing (www.zdnet.com S:-0.03 )
720 points by commoner 2550 days ago | 209 comments on HN | Mild positive Editorial · v3.7 · 2026-02-28 14:01:25
Summary Privacy & Anti-Surveillance Advocates
This ZDNET article reports on Firefox's adoption of letterboxing, an anti-fingerprinting technique developed by the Tor Project to protect user privacy. The article advocates positively for privacy-enhancing technology by explaining how letterboxing prevents advertising networks from profiling users through browser fingerprinting. Coverage frames privacy protection as beneficial to users and provides implementation details, though structural tension exists between the site's commercial advertising model and its privacy advocacy.
Article Heatmap
Preamble: +0.24 — Preamble P Article 1: +0.12 — Freedom, Equality, Brotherhood 1 Article 2: +0.06 — Non-Discrimination 2 Article 3: +0.18 — Life, Liberty, Security 3 Article 4: ND — No Slavery Article 4: No Data — No Slavery 4 Article 5: ND — No Torture Article 5: No Data — No Torture 5 Article 6: ND — Legal Personhood Article 6: No Data — Legal Personhood 6 Article 7: ND — Equality Before Law Article 7: No Data — Equality Before Law 7 Article 8: ND — Right to Remedy Article 8: No Data — Right to Remedy 8 Article 9: ND — No Arbitrary Detention Article 9: No Data — No Arbitrary Detention 9 Article 10: ND — Fair Hearing Article 10: No Data — Fair Hearing 10 Article 11: ND — Presumption of Innocence Article 11: No Data — Presumption of Innocence 11 Article 12: +0.40 — Privacy 12 Article 13: ND — Freedom of Movement Article 13: No Data — Freedom of Movement 13 Article 14: ND — Asylum Article 14: No Data — Asylum 14 Article 15: ND — Nationality Article 15: No Data — Nationality 15 Article 16: ND — Marriage & Family Article 16: No Data — Marriage & Family 16 Article 17: ND — Property Article 17: No Data — Property 17 Article 18: ND — Freedom of Thought Article 18: No Data — Freedom of Thought 18 Article 19: +0.30 — Freedom of Expression 19 Article 20: ND — Assembly & Association Article 20: No Data — Assembly & Association 20 Article 21: ND — Political Participation Article 21: No Data — Political Participation 21 Article 22: ND — Social Security Article 22: No Data — Social Security 22 Article 23: ND — Work & Equal Pay Article 23: No Data — Work & Equal Pay 23 Article 24: ND — Rest & Leisure Article 24: No Data — Rest & Leisure 24 Article 25: ND — Standard of Living Article 25: No Data — Standard of Living 25 Article 26: ND — Education Article 26: No Data — Education 26 Article 27: ND — Cultural Participation Article 27: No Data — Cultural Participation 27 Article 28: ND — Social & International Order Article 28: No Data — Social & International Order 28 Article 29: ND — Duties to Community Article 29: No Data — Duties to Community 29 Article 30: ND — No Destruction of Rights Article 30: No Data — No Destruction of Rights 30
Negative Neutral Positive No Data
Aggregates
Editorial Mean +0.38 Structural Mean -0.03
Weighted Mean +0.23 Unweighted Mean +0.22
Max +0.40 Article 12 Min +0.06 Article 2
Signal 6 No Data 25
Volatility 0.11 (Low)
Negative 0 Channels E: 0.6 S: 0.4
SETL +0.40 Editorial-dominant
FW Ratio 57% 13 facts · 10 inferences
Evidence 14% coverage
2H 4M 25 ND
Theme Radar
Foundation Security Legal Privacy & Movement Personal Expression Economic & Social Cultural Order & Duties Foundation: 0.14 (3 articles) Security: 0.18 (1 articles) Legal: 0.00 (0 articles) Privacy & Movement: 0.40 (1 articles) Personal: 0.00 (0 articles) Expression: 0.30 (1 articles) Economic & Social: 0.00 (0 articles) Cultural: 0.00 (0 articles) Order & Duties: 0.00 (0 articles)
HN Discussion 20 top-level · 28 replies
regecks 2019-03-06 22:19 UTC link
I try enabling this occasionally, but it causes my zoom preference to be forgotten for each site after I close the tab. Seems to be intentional (https://bugzilla.mozilla.org/show_bug.cgi?id=1369357).

I need zoom to not ruin my eyes - is it just too hard to mask the true zoom?

With the letterboxing, it seems like it would mostly not do anything when using a tiling WM with fixed splits. Does that sound right?

cronix 2019-03-06 22:28 UTC link
> The general idea is that "letterboxing" will mask the window's real dimensions by keeping the window width and height at multiples of 200px and 100px during the resize operation --generating the same window dimensions for all users-- and then adding a "gray space" at the top, bottom, left, or right of the current page.

> The advertising code, which listens to window resize events, then reads the generic dimensions, sends the data to its server, and only after does Firefox remove the "gray spaces" using a smooth animation a few milliseconds later.

Would using a setTimeout() on the window resize event bypass this? Send the data 20-50ms after resize is completed giving enough time for the letterboxing stuff to go away revealing the actual dimensions, or something? They say it only blocks the dimensions during the resize event and FF removes the letterboxing "a few ms later"

meruru 2019-03-06 22:58 UTC link
I recommend the privacy.resistFingerpriting about:config mentioned. It's been available for a while and does other things too, like changing your user agent.
meruru 2019-03-06 23:37 UTC link
This is awesome. Other things I'd like to see added directly to Firefox are things like Ad and script blocking, HTTPS everywhere, and maybe something like a Tor button so that I don't have to rely on third parties for these critical privacy features.
thatsaguy 2019-03-06 23:55 UTC link
I've been using FF with resistFinterprinting on since it was available. Letterboxing does break a lot of websites and apps, sometimes making them unusable due to incorrect positioning and scaling of the elements.
newscracker 2019-03-06 23:59 UTC link
Every time there's something about online privacy with browsers, it's mostly Firefox or Safari. I wondered if Chrome had resisting fingerprinting on its radar (guessing that it wouldn't be in Google's interests to add any feature that would thwart profiling users online), and I found this [1] confirming my guess (emphasis mine):

> Since we don't believe it's feasible to provide some mode of Chrome that can truly prevent passive fingerprinting, we will mark all related bugs and feature requests as WontFix.

I haven't read all the analyses in the links in that article, but this sounds defeatist and lazy, much unlike a stance that Chromium would take on security or performance on the web.

Contrast the above with what this article says about Firefox:

> Firefox's upcoming letterboxing feature is part of a larger project that started in 2016, called Tor Uplift.

> Part of Tor Uplift, Mozilla developers have been slowly porting privacy-hardening features developed originally for the Tor Browser and integrating them into Firefox.

If you value online privacy, your best choice is Firefox (though it requires some additional manual configuration). Safari comes second (its extensions directory could use more love). The choice where you can add more of your influence to is Firefox — by using it, evangelizing it and by donating (if feasible) to it.

[1]: https://chromium.googlesource.com/chromium/src/+/master/docs...

godelski 2019-03-07 00:10 UTC link
What's the canvas fingerprinting one do? From what I (very poorly) understand, Tor returns a constant number for fingerprint requests. Can this be done for other requests?
lxe 2019-03-07 01:41 UTC link
Why not simply allow the user to control the js apis that are available/enabled, kind of like the camera/mic permissions? If sites simply cannot use the mouse events or window size events, they won’t be able to fingerprint. This grey box alternative seems like a complicated hack.
fxfan 2019-03-07 04:58 UTC link
Maybe firefox should also install ublock origin by default?

This isn't just for some power users- it will increase their share among regular people whose pages will load even faster making Firefox popular.

Or are they waiting until the user share falls below 5%? Maybe they should listen to Andy grove and prepare now.

known 2019-03-07 05:33 UTC link
Why not just download/use Tor Browser?
osrec 2019-03-07 05:35 UTC link
If Firefox could make their Dev tools as good as Chrome's, I would switch immediately.
FavouriteColour 2019-03-07 06:32 UTC link
If it helps defeat tracking then I’d like an option to snap to pre-defined sizes as I resize the window.
tjpnz 2019-03-07 07:05 UTC link
Why can't the ad industry just accept that there are some people out there who don't want to see ads and wouldn't click on one to begin with? Then they can honor Do Not Track and those who choose to work in adtech can start working on things that are more productive to their business.
mindslight 2019-03-07 07:17 UTC link
But I've already got code in my xmonad.hs that clamps firefox windows to common monitor sizes?

It's truly unfortunate that browsers just punted on security, dumping endless amounts of sensitive information into a purported sandbox. Why bother developing something with a secure mindset to begin with, when you can just band-aid on patches later?! It's the sendmail/ActiveX philosophy all over again, only now with network effects.

scotty79 2019-03-07 08:56 UTC link
How will that not break most of js positioning done on window.resize?
Tsubasachan 2019-03-07 09:36 UTC link
Nice but the more you want privacy the more CAPTCHA Google will throw at you.
patrickaljord 2019-03-07 10:52 UTC link
At this point Firefox should just merge with Tor if they want to market themselves as the pro-privacy browser. Right now I just use Chrome when I'm using my real identity for work and shopping and social media anyway as it's a very good browser and supported everywhere and has an open source version through Chromium.

When I need actual privacy, I just use Tor which supports most sites and is way more protective of my privacy than firefox. May switch to Brave in the future for this use case as they're adding Tor support but right now Chrome + Tor every once in a while works best for me.

kowdermeister 2019-03-07 11:08 UTC link
This is horrible from a UX perspective. There are many fingerprinting techniques besides this. I don't see how adding a user hostile behaviour will help.
Yuval_Halevi 2019-03-07 15:29 UTC link
I'm using Brave for a while they have a function to surf the web through Tor network

which seems pretty safe

I'm glad to hear the Firefox also give a lot of value to privacy

techvellacom 2019-03-07 17:04 UTC link
The Tor Uplift process later continued in Firefox 55 when Mozilla added a Tor Browser feature known as First-Party Isolation (FPI), which worked by separating cookies on a per-domain basis, preventing ad trackers from using cookies to track users across the Internet. This feature is now at the heart of Project Fission and will morph into a Chrome-like "site isolation" feature for Firefox.

This is just factually incorrect.

strombofulous 2019-03-06 23:03 UTC link
Is there any reason this isn't on by default? I don't know exactly how it works, but to my understanding anti fingerprinting tech generally works better when everyone uses it (otherwise you stick out as the "anti fingerprinting" browser)
pera 2019-03-06 23:08 UTC link
I've been using privacy.resistFingerprinting for a while and also recommend it, but there is one major "side effect": your reCAPTCHA score will drop to 0.1 making many websites really tedious to use. It's a price I'm willing to pay though...
trumped 2019-03-06 23:24 UTC link
Havent they thought about not broadcasting the window size... wtf. We are doomed apparently.
SquareWheel 2019-03-06 23:25 UTC link
Changing your user agent will do terrible things to captchas. I actually change my user agent specifically to test the fail state of captchas. I'd suggest only turning that on if you know what you're doing.
godelski 2019-03-07 00:18 UTC link
> guessing that it wouldn't be in Google's interests to add any feature that would thwart profiling users online

I would actually think the opposite. Wouldn't it be better because then only Google would have that information? Only Google would be able to fingerprint. This is of course under the assumption (which is currently accurate) that Google has the majority share of browsers. But maybe it wouldn't be, because it would teach others how to thwart their fingerprinting.

commoner 2019-03-07 00:18 UTC link
It prompts the user to decline a site from accessing data from the Canvas API. This data can uniquely identify the user's computer. The Firefox feature is identical to the one from the Tor Browser.

Screenshot: https://thehackernews.com/2017/10/canvas-browser-fingerprint...

https://www.torproject.org/projects/torbrowser/design/ (see the "HTML5 Canvas Image Extraction" section)

https://gitweb.torproject.org/tor-browser.git/commit/?h=tor-...

https://developer.mozilla.org/en-US/docs/Web/API/Canvas_API

3pt14159 2019-03-07 00:59 UTC link
There is a way to stop fingerprinting. That way is serving pages via distributed network (over a WoT or torrent-like thing).

All these other ways do is give people the illusion that they're safe from being tracked, when the reality is that they're tracked just the same, but by fewer people so the data is more valuable. This means that the money is centralizing around the actors with the most inexplicable methods of tracking; which are almost always the worst actors.

I hate it too, even though I'm not blameless. It's impossible to compete without a level playing field, and that playing field needs to be technically enforced, because otherwise we get region shopping and advertising / analytics models that push people to create intractable mechanisms so they can paper over how tracking fed into it.

For example, imagine a world where I'm bidding to show an ad to a visitor of nytimes.com. Now, I may not track the user, but if anyone is, they can incorporate what they know and sell that traffic back to me on a CPA model. All I see is the incoming traffic. I don't track anyone (wink, wink) but there is no difference.

In the long run this will either be solved one way or another, and all these online surveillance capitalism companies will crash and burn. Either we get a web with technical guarantees or we get a balkanized internet where every state makes their own weird laws about what is allowed or not.

mLuby 2019-03-07 02:46 UTC link
The problem is this will straight up crash many important sites. In the battle between usability and privacy, usability wins. Just try disabling javascript or cookies and see how long you last.
kabacha 2019-03-07 04:37 UTC link
Presumably the implementation is smarter than being defeated by this easy trick, but I too wonder how it works.

> Finally, an extra zoom was applied to the viewport in fullscreen and maximized modes to use as much of the screen as possible and minimize the size of the empty margins. In that case, the window had a "letterbox" (margins at top and bottom only) or "pillbox" (margins at left and right only) appearance. window.devicePixelRatio was always spoofed to 1.0 even when device pixels != CSS pixels.

So presumably the window size is not being reset to real size - firefox just does a smart zoomin. In other words the fake size remains throughout entire session.

nilolo 2019-03-07 05:53 UTC link
I'm guessing they would lose their financing from Google by adding UBlock.
SunnyS 2019-03-07 06:39 UTC link
I agree it's wonderful. Helps with fighting trackers
medecau 2019-03-07 06:50 UTC link
You using dev tools on all websites you visit?
adrianN 2019-03-07 06:51 UTC link
If changes are included upstream, that reduces the maintenance burden.
antpls 2019-03-07 06:56 UTC link
Firefox is already valuable for browsing on mobile phone, where there is not much space on screen to have Dev console anyway. I recommend trying Firefox Mobile
daveFNbuck 2019-03-07 07:20 UTC link
That might have worked if Microsoft hadn't enabled Do Not Track by default.
Jonnax 2019-03-07 07:23 UTC link
Here's a good comparison: Android Chrome's user agent:

Mozilla/5.0 (Linux; Android 6.0.1; SM-G928F Build/MMB29K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Mobile Safari/537.36

Versus Android Firefox's user agent: Mozilla/5.0 (Android 9; Mobile; rv:66.0) Gecko/66.0 Firefox/66.0

Note how the Chrome browser announces your phone model and software build version to the world.

With regional models with carrier customised software builds, simply the user agent can be used to fingerprint a user.

CodeWriter23 2019-03-07 07:52 UTC link
> Would using a setTimeout() on the window resize event bypass this? Send the data 20-50ms after resize is completed giving enough time for the letterboxing stuff to go away revealing the actual dimensions, or something? They say it only blocks the dimensions during the resize event and FF removes the letterboxing "a few ms later"

No, it will be a setTimeout on the document load event that will poll the window size every 100ms from here till the page is evicted by a close or navigation event, increasing the detrimental effect of adtech.

scarejunba 2019-03-07 07:53 UTC link
The ad industry was ready to honour DNT. MS killed it by going default.
thepangolino 2019-03-07 08:58 UTC link
Is there any legitimate reason for it? Besides playing pong with browser windows.
Vinnl 2019-03-07 08:59 UTC link
> it seems like it would mostly not do anything when using a tiling WM with fixed splits

In the bug report [1] it says:

> We haven't yet landed this feature in Tor Browser for at a few reasons: > - ... > - * Tiling window managers on Linux are hard to detect. Any implementation will need to behave appropriately for those.

So it appears they are still working on that.

[1] https://bugzilla.mozilla.org/show_bug.cgi?id=1407366

alkonaut 2019-03-07 09:22 UTC link
They should turn fingerprinting to max and install uBlock origin by default.

It might mean millions of FF users would suddenly struggle with captchas, but it might also mean that site creators just stop using reCaptcha and similar.

the_pwner224 2019-03-07 09:46 UTC link
Aside from the downsides mentioned in other comments, this significantly reduces JS timer accuracy which will make games and WebGL laggy and unusable.

In about:config if you search for 'resistFingerprinting' there seem to be sub-settings which you can tweak to disable the timer modifications, but even after tweaking them I wasn't able to get performance to be as smooth as when resistFP was completely disabled.

dwd 2019-03-07 10:51 UTC link
Firefox is a good start, then it's also worth checking your browser with the EFF Panopticlick to see how your settings affect your uniqueness.

https://panopticlick.eff.org

HunOL 2019-03-07 11:15 UTC link
Ads are not always for clicking. If you don't want to see ads than you should pay for content or leave.
tinus_hn 2019-03-07 11:31 UTC link
Google isn't going to bother the general public like that, that’s limited to small groups like techs who block the canvas fingerprinting. Do you think Google is going to spam people that use the Safari default intelligent tracking protection?
maxencecornet 2019-03-07 12:17 UTC link
>May switch to Brave in the future

In the futur? Tor tabs are already a feature of Brave, as of today

commoner 2019-03-07 20:56 UTC link
Fortunately, this is entirely optional. The "privacy.resistFingerprinting" option bundles a set of features that make it more difficult for sites to uniquely identify the user at a cost to usability. It's up to each user to determine whether that usability cost is worth the privacy improvements. On Firefox, it's an opt-in setting, off by default.
move-on-by 2019-03-08 04:17 UTC link
What else can they do to decrease the effectiveness of increasingly hostile trackers?
Editorial Channel
What the content says
+0.80
Article 12 Privacy
High Advocacy Framing Practice
Editorial
+0.80
SETL
+0.89

Article's primary focus: anti-fingerprinting technique explicitly designed to protect user privacy. Strongly advocates for privacy protection through positive reporting of feature benefits. Explains technical mechanism and frames as user benefit against tracking networks.

+0.50
Article 19 Freedom of Expression
Medium Framing
Editorial
+0.50
SETL
+0.50

Privacy from fingerprinting enables freedom of expression and thought by preventing surveillance-based profiling. Reporting on privacy protection supports the foundational conditions for free expression.

+0.40
Preamble Preamble
High Framing
Editorial
+0.40
SETL
+0.40

Article frames privacy protection as fundamental to protecting human dignity from unauthorized profiling by tracking networks

+0.30
Article 3 Life, Liberty, Security
Medium Framing
Editorial
+0.30
SETL
+0.30

Privacy protection from fingerprinting enhances user security and liberty from surveillance threats

+0.20
Article 1 Freedom, Equality, Brotherhood
Medium Framing
Editorial
+0.20
SETL
+0.20

Feature applies privacy protection equally to all users regardless of identity or characteristics

+0.10
Article 2 Non-Discrimination
Medium Framing
Editorial
+0.10
SETL
+0.10

Letterboxing does not discriminate in its application across users

ND
Article 4 No Slavery

Not addressed

ND
Article 5 No Torture

Not addressed

ND
Article 6 Legal Personhood

Not addressed

ND
Article 7 Equality Before Law

Not addressed

ND
Article 8 Right to Remedy

Not addressed

ND
Article 9 No Arbitrary Detention

Not addressed

ND
Article 10 Fair Hearing

Not addressed

ND
Article 11 Presumption of Innocence

Not addressed

ND
Article 13 Freedom of Movement

Not addressed

ND
Article 14 Asylum

Not addressed

ND
Article 15 Nationality

Not addressed

ND
Article 16 Marriage & Family

Not addressed

ND
Article 17 Property

Not addressed

ND
Article 18 Freedom of Thought

Not addressed

ND
Article 20 Assembly & Association

Not addressed

ND
Article 21 Political Participation

Not addressed

ND
Article 22 Social Security

Not addressed

ND
Article 23 Work & Equal Pay

Not addressed

ND
Article 24 Rest & Leisure

Not addressed

ND
Article 25 Standard of Living

Not addressed

ND
Article 26 Education

Not addressed

ND
Article 27 Cultural Participation

Not addressed

ND
Article 28 Social & International Order

Not addressed

ND
Article 29 Duties to Community

Not addressed

ND
Article 30 No Destruction of Rights

Not addressed

Structural Channel
What the site does
0.00
Preamble Preamble
High Framing
Structural
0.00
Context Modifier
ND
SETL
+0.40

Site structure is standard commercial publisher; no inherent privacy protections embedded in site design

0.00
Article 1 Freedom, Equality, Brotherhood
Medium Framing
Structural
0.00
Context Modifier
ND
SETL
+0.20

Site structure neutral on equality

0.00
Article 2 Non-Discrimination
Medium Framing
Structural
0.00
Context Modifier
ND
SETL
+0.10

Neutral

0.00
Article 3 Life, Liberty, Security
Medium Framing
Structural
0.00
Context Modifier
ND
SETL
+0.30

Neutral

0.00
Article 19 Freedom of Expression
Medium Framing
Structural
0.00
Context Modifier
ND
SETL
+0.50

News site reports freely on privacy topics; structural neutrality

-0.20
Article 12 Privacy
High Advocacy Framing Practice
Structural
-0.20
Context Modifier
ND
SETL
+0.89

Commercial news publisher (Ziff Davis) with advertising-dependent revenue model. Site likely employs extensive user tracking for ad targeting, creating structural contradiction with editorial privacy advocacy. Tension between reported values and actual practices.

ND
Article 4 No Slavery

Not addressed

ND
Article 5 No Torture

Not addressed

ND
Article 6 Legal Personhood

Not addressed

ND
Article 7 Equality Before Law

Not addressed

ND
Article 8 Right to Remedy

Not addressed

ND
Article 9 No Arbitrary Detention

Not addressed

ND
Article 10 Fair Hearing

Not addressed

ND
Article 11 Presumption of Innocence

Not addressed

ND
Article 13 Freedom of Movement

Not addressed

ND
Article 14 Asylum

Not addressed

ND
Article 15 Nationality

Not addressed

ND
Article 16 Marriage & Family

Not addressed

ND
Article 17 Property

Not addressed

ND
Article 18 Freedom of Thought

Not addressed

ND
Article 20 Assembly & Association

Not addressed

ND
Article 21 Political Participation

Not addressed

ND
Article 22 Social Security

Not addressed

ND
Article 23 Work & Equal Pay

Not addressed

ND
Article 24 Rest & Leisure

Not addressed

ND
Article 25 Standard of Living

Not addressed

ND
Article 26 Education

Not addressed

ND
Article 27 Cultural Participation

Not addressed

ND
Article 28 Social & International Order

Not addressed

ND
Article 29 Duties to Community

Not addressed

ND
Article 30 No Destruction of Rights

Not addressed

Supplementary Signals
How this content communicates, beyond directional lean. Learn more
Epistemic Quality
How well-sourced and evidence-based is this content?
0.69 medium claims
Sources
0.7
Evidence
0.8
Uncertainty
0.6
Purpose
0.8
Propaganda Flags
No manipulative rhetoric detected
0 techniques detected
Emotional Tone
Emotional character: positive/negative, intensity, authority
measured
Valence
+0.4
Arousal
0.4
Dominance
0.5
Transparency
Does the content identify its author and disclose interests?
0.67
✓ Author ✗ Conflicts ✗ Funding
More signals: context, framing & audience
Solution Orientation
Does this content offer solutions or only describe problems?
0.82 solution oriented
Reader Agency
0.7
Stakeholder Voice
Whose perspectives are represented in this content?
0.40 2 perspectives
Speaks: institutioncorporation
About: individuals
Temporal Framing
Is this content looking backward, at the present, or forward?
prospective short term
Geographic Scope
What geographic area does this content cover?
global
Complexity
How accessible is this content to a general audience?
moderate medium jargon general
Audit Trail 13 entries
2026-02-28 14:01 eval Evaluated by claude-haiku-4-5-20251001: +0.23 (Mild positive)
2026-02-28 12:33 eval_success Lite evaluated: Mild positive (0.20) - -
2026-02-28 12:33 rater_validation_warn Lite validation warnings for model llama-3.3-70b-wai: 0W 1R - -
2026-02-28 12:33 eval Evaluated by llama-3.3-70b-wai: +0.20 (Mild positive) 0.00
2026-02-28 12:28 eval_success Lite evaluated: Mild positive (0.20) - -
2026-02-28 12:28 eval Evaluated by llama-3.3-70b-wai: +0.20 (Mild positive)
2026-02-28 12:28 rater_validation_warn Lite validation warnings for model llama-3.3-70b-wai: 0W 1R - -
2026-02-28 12:27 eval_success Lite evaluated: Mild positive (0.28) - -
2026-02-28 12:27 eval Evaluated by llama-4-scout-wai: +0.28 (Mild positive) 0.00
2026-02-28 12:27 rater_validation_warn Lite validation warnings for model llama-4-scout-wai: 0W 1R - -
2026-02-28 12:22 rater_validation_warn Lite validation warnings for model llama-4-scout-wai: 0W 1R - -
2026-02-28 12:22 eval_success Lite evaluated: Mild positive (0.28) - -
2026-02-28 12:22 eval Evaluated by llama-4-scout-wai: +0.28 (Mild positive)