[tor-bugs] #27307 [Applications/Tor Browser]: NoScript marks HTTP Onion as insecure
Tor Bug Tracker & Wiki
blackhole at torproject.org
Sat Aug 25 08:31:04 UTC 2018
#27307: NoScript marks HTTP Onion as insecure
--------------------------------------+--------------------------
Reporter: cypherpunks3 | Owner: tbb-team
Type: defect | Status: closed
Priority: Low | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Minor | Resolution: wontfix
Keywords: noscript | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+--------------------------
Comment (by ma1):
Replying to [comment:2 gk]:
> Replying to [comment:1 cypherpunks3]:
> > PS: Just to be clear, I'm not calling for JS to be enabled for HTTP
onions on Safer security setting in this ticket, only that ALL onions
should be marked as secure in the NoScript UI.
>
> That's a good thing to bring up with the NoScript dev but it is nothing
we'll fix in Tor Browser ourselves.
I think it might be a good idea, but only if I've got a sure-fire way to
tell NoScript is running inside the Tor browser.
{{{
> console.log(await browser.runtime.getBrowserInfo())
Object { name: "Firefox", vendor: "Mozilla", version: "60.1.0", buildID:
"20180204020101" }
}}}
Maybe you could send an "isTorBrowser: true" additional property within
your updateSettings messages.
Any better suggestion?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27307#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list