[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #21137 [Applications/Tor Browser]: NoScript and HTTPS everywhere update, a fingerprint risk?



#21137: NoScript and HTTPS everywhere update, a fingerprint risk?
--------------------------------------+---------------------------
 Reporter:  i139                      |          Owner:
     Type:  defect                    |         Status:  closed
 Priority:  Medium                    |      Milestone:
Component:  Applications/Tor Browser  |        Version:
 Severity:  Normal                    |     Resolution:  not a bug
 Keywords:                            |  Actual Points:
Parent ID:                            |         Points:
 Reviewer:                            |        Sponsor:
--------------------------------------+---------------------------
Changes (by gk):

 * status:  new => closed
 * resolution:   => not a bug
 * component:  - Select a component => Applications/Tor Browser


Comment:

 Not sure what this ticket as about in particular. But if the problem is
 that Tor Browser users are not getting a new Tor Browser version at the
 same time then there is nothing we can do in this regard.

 If the issue is Tor Browser users getting NoScript or HTTPS-Everywhere
 updates at different times then this will be solved by disabling both and
 shipping updates only with Tor Browser updates. The bug for HTTPS-
 Everywhere is #10394 for instance.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21137#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs