[tor-commits] [tor-browser-spec/master] Misc cleanups.

mikeperry at torproject.org mikeperry at torproject.org
Mon Apr 28 15:18:48 UTC 2014


commit ea5f34a032323821f408413447a45fe7679f5976
Author: Mike Perry <mikeperry-git at fscked.org>
Date:   Wed Feb 20 18:26:51 2013 -0800

    Misc cleanups.
---
 docs/design/design.xml |   45 +++++++++++++++++++++++----------------------
 1 file changed, 23 insertions(+), 22 deletions(-)

diff --git a/docs/design/design.xml b/docs/design/design.xml
index 223ca0c..254726f 100644
--- a/docs/design/design.xml
+++ b/docs/design/design.xml
@@ -2294,9 +2294,9 @@ javascript into the chrome (and thus gain complete control of the browser).
 <title>Towards Linkability Transparency</title>
 <para>
 
-The <link linkend="privacy">privacy properties</link> in Tor Browser are
-designed around a model that assumes that link click navigation indicates user
-consent for tracking between the linking site and the destination site. This
+The <link linkend="privacy">privacy properties</link> of Tor Browser are
+based upon the assumption that link click navigation indicates user
+consent to tracking between the linking site and the destination site. This
 definition of consent is primarily pragmatic: It is simply not possible to
 entirely prevent the ability of a destination site to collaberate with a source
 site during link-click nagivation (due to GET parameters, POST parameters, and
@@ -2305,13 +2305,14 @@ several other vectors, both explicit and implicit).
 </para>
 <para>
 
-However, with a few changes to web standards, it is at least possible to make
-it evident to experts and attentive users when such collaboration is occurring
+However, with a few changes to web standards, it is possible to make it
+evident to experts and attentive users when such collaboration is occurring
 before they actually click on a link. In an ideal world, if a user clicks on a
-link that leads to another url bar origin, the vector of tracking possible
-during that link click would be limited to the contents of the URL parameters
-itself. This section serves to enumerate web technologies that create other
-link-click side channels that hinder user awareness of link-click tracking.
+link that leads to another url bar origin, the mechanisms of tracking during
+that link click would be limited to the contents of URL parameters that are
+fully visible to the user <emphasis>before</emphasis> they click. This section
+serves to enumerate web technologies that create other link-click side
+channels that hinder user awareness of navigation tracking.
 
 </para>
 
@@ -2324,7 +2325,7 @@ unlinkability.
 
 </para>
 
-<sect1 id="deprecate">
+<sect2 id="deprecate">
  <title>Deprecation Wishlist</title>
  <orderedlist>
   <listitem>The Referer Header
@@ -2352,8 +2353,8 @@ source URL parameters.
 
 We believe the Referer header should be either eliminated or made explicit. If
 a site wishes to transmit its URL to third parties or during link-click, it
-should specify this as a property of its HTML. With an explicit property, it
-would be possible for the user agent to inform the user if they are about to
+should have to specify this as a property of its HTML. With an explicit property, it
+would then be possible for the user agent to inform the user if they are about to
 click on a link that will either transmit referer information or specified a
 <ulink
 url="https://developer.mozilla.org/en-US/docs/HTML/Element/a#Attributes">"ping"</ulink>
@@ -2374,7 +2375,7 @@ XSRF protection and federated login.
    <para>
 
 It's our opinion that the contents of window.name should not be preserved for
-cross-origin navigation, but doing so may break federated login.
+cross-origin navigation, but doing so may break federated login for some sites.
 
    </para>
   </listitem>
@@ -2385,21 +2386,21 @@ In general, it should not be possible for onclick handlers to alter the
 navigation destination of 'a' tags, transform them into POST requests, or
 otherwise create situations where a user believes they are clicking on a link
 leading to one URL and end up on another. This functionality is deceptive and
-is frequently a vector for malware.
+is frequently a vector for malware and phishing attacks.
 
    </para>
    <para>
 
-Automated cross-origin redirects are one form of behavior that it is possible
-for us to address ourselves. We are still working on finding the best way to handle 
-<ulink url="https://trac.torproject.org/projects/tor/ticket/3600">that
-issue</ulink>.
+Automated cross-origin redirects are one form of this behavior that is
+possible for us to address ourselves. We are still working on finding the best
+way to handle <ulink
+url="https://trac.torproject.org/projects/tor/ticket/3600">that issue</ulink>.
 
    </para>
   </listitem>
  </orderedlist>
-</sect1>
-<sect1>
+</sect2>
+<sect2>
  <title>Promising Standards</title>
  <orderedlist>
   <listitem><ulink url="http://web-send.org">Web-Send Introducer</ulink>
@@ -2413,7 +2414,7 @@ features</ulink>, as well.
 
    </para>
   </listitem>
-  <listitem><ulink url="https://developer.mozilla.org/en-US/docs/Persona">Mozilla Persona</ulink> (formerly BrowserID)
+  <listitem><ulink url="https://developer.mozilla.org/en-US/docs/Persona">Mozilla Persona</ulink>
    <para>
 
 Mozilla's Persona is designed to provide decentralized, cryptographically
@@ -2425,6 +2426,6 @@ better solution to the federated login problem.
    </para>
   </listitem>
  </orderedlist>
-</sect1>
+</sect2>
 </appendix>
 </article>





More information about the tor-commits mailing list