[tor-bugs] #6293 [Flashproxy]: Disable self when running in Tor	browser
    Tor Bug Tracker & Wiki 
    blackhole at torproject.org
       
    Wed Nov 21 21:55:57 UTC 2012
    
    
  
#6293: Disable self when running in Tor browser
------------------------+---------------------------------------------------
 Reporter:  dcf         |          Owner:  dcf           
     Type:  defect      |         Status:  needs_revision
 Priority:  normal      |      Milestone:                
Component:  Flashproxy  |        Version:                
 Keywords:              |         Parent:                
   Points:              |   Actualpoints:                
------------------------+---------------------------------------------------
Changes (by dcf):
  * status:  new => needs_revision
Comment:
 Thanks, this is good work.
 I'm willing to trade some false positives (and perhaps remove some false
 negatives) for an even simpler test. Grepping for "Permission denied" in
 error text strikes me as not robust. Similarly "Shockwave Flash": I don't
 want to couple this test too closely to the internals of Tor Browser.
 Checking `navigator.platform` seems redundant with the user-agent check.
 I'll bet that the user-agent comparison already gets us almost all the way
 there. To that let's add the `sessionStorage === null` and
 `navigator.mimeTypes.length == 0` tests, and make that the whole of the
 detection.
 Please do the above in the form of a patch against `flashproxy.js`, and
 attach the patch to the ticket. The function should be called
 `is_likely_tor_browser` or something similar. You can add a call to this
 function to `flashproxy_should_disable`.
-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/6293#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
    
    
More information about the tor-bugs
mailing list