[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #21549 [Applications/Tor Browser]: Investigate wasm for linkability/fingerprintability/disk avoidance issues



#21549: Investigate wasm for linkability/fingerprintability/disk avoidance issues
--------------------------------------------+--------------------------
 Reporter:  gk                              |          Owner:  tbb-team
     Type:  task                            |         Status:  new
 Priority:  Very High                       |      Milestone:
Component:  Applications/Tor Browser        |        Version:
 Severity:  Normal                          |     Resolution:
 Keywords:  ff60-esr, TorBrowserTeam201809  |  Actual Points:
Parent ID:                                  |         Points:
 Reviewer:                                  |        Sponsor:
--------------------------------------------+--------------------------

Comment (by gk):

 Replying to [comment:16 legind]:
 > Relevant to HTTPS Everywhere, which would like to rewrite portions of
 the code in WASM for better performance: https://github.com/EFForg/https-
 everywhere/issues/17143.

 I think we could bypass the investigation for HTTPS Everywhere (and
 extensions in general) at least by assuming it belongs to privileged code
 (which it does) and that the linkability etc. concerns only applies to
 content (which I think is not unreasonable). The idea then could be to
 implement a switch to being able to disable WASM and similar things
 (ASM.js comes to mind) for content only while leaving chrome like code
 untouched.

 Or maybe the chrome/content separation already exists and WebExtensions
 are just not properly added to the chrome bucket?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21549#comment:17>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs