[tor-bugs] #5761 [TorBrowserButton]: Decide if it's safe to pass the Dooble around the Tor Community
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Sun May 6 01:10:49 UTC 2012
#5761: Decide if it's safe to pass the Dooble around the Tor Community
---------------------------------+------------------------------------------
Reporter: mike123 | Owner: mike123
Type: enhancement | Status: closed
Priority: normal | Milestone:
Component: TorBrowserButton | Version:
Resolution: invalid | Keywords:
Parent: | Points:
Actualpoints: |
---------------------------------+------------------------------------------
Comment(by textbrowser):
There is a very valid reason for storing passphrase hashes. If a user
enters a temporary-session mode, some data is recorded in order to satisfy
visual containers. Such containers are populated by reading and decoding
values from databases. Dooble needs to know which values belong to that
session and it does so by using passphrase hashes. Instead of a hash, a
boolean could be used to indicate that the data is temporary. However,
that is not the current case.
Error-proofing encodedString() is not a simple task. It is understood to
tolerate failure. I've noted your suggestion.
Enjoy playing with Fire.
It's been a hoot. Bye.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5761#comment:31>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list