[tor-bugs] #28259 [Applications/Tor Browser]: Is not saving history hurting Tor Browser retention rates?
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Feb 14 17:55:25 UTC 2019
#28259: Is not saving history hurting Tor Browser retention rates?
-------------------------------------------------+-------------------------
Reporter: arthuredelstein | Owner: tbb-
| team
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: gallagher2018, ux-team, tbb- | Actual Points:
usability |
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Comment (by kevun):
Hello! Author of the paper in question, here.
Addressing the comments of gk and pospeselr, I think if saving history and
offering a password manager were available in the Tor Browser, it should
definitely be dependent on the threat model of the user. I think there are
many threat models in which considering a local adversary makes perfect
sense, and that the encryption of the information such as history and
passwords is not always enough to protect people with a local adversary in
certain regimes, such as the UK and others, where mandatory key disclosure
is a tool that law enforcement could use to destroy anonymity, or hold
people who have encrypted histories in prison indefinitely. However, in
other regimes that do not have mandatory key disclosure laws, such as the
US, encryption is enough to protect the history and passwords of the
person using the Tor Browser.
However, for people who do not have a local adversary, the concept of disk
avoidance in the TB design document does not make much sense. It makes TTB
less usable than other browsers for no real benefit.
The original context in which I proposed this solution in the paper was to
have an "adversary wizard" such that people could choose their
adversary/adversaries and have the disk avoidance features turn on and off
for them, based on their selections. If that is too burdensome or not
realistic, however, it may simply be sufficient to have an option to allow
disk avoidance in preferences, with having the safer option (not storing
history or passwords) as the default. I want TTB to be more usable,
certainly, but security is most definitely the primary priority in my
mind.
Either way, I don't think that this should be an option that remains
unconfigurable for the average person using Tor. It may be possible to
have three settings for this:
1) Default, current setting. Disk avoidance remains.
2) Disk avoidance is turned off, and all history is encrypted and requires
a passphrase at TTB launch.
3) Disk avoidance is turned off, no encryption is used and no passphrase
is required. (I don't like this one, but I could see some users who
***really*** aren't worried about local adversaries requesting it).
However, there are pros and cons to each of these settings. I think
they're worth discussing in more detail, for anyone who is interested in
weighing in.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28259#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list