[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #21137 [Applications/Tor Browser]: NoScript and HTTPS everywhere update, a fingerprint risk?
#21137: NoScript and HTTPS everywhere update, a fingerprint risk?
--------------------------------------+---------------------------
Reporter: i139 | Owner:
Type: defect | Status: closed
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution: not a bug
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+---------------------------
Changes (by gk):
* status: new => closed
* resolution: => not a bug
* component: - Select a component => Applications/Tor Browser
Comment:
Not sure what this ticket as about in particular. But if the problem is
that Tor Browser users are not getting a new Tor Browser version at the
same time then there is nothing we can do in this regard.
If the issue is Tor Browser users getting NoScript or HTTPS-Everywhere
updates at different times then this will be solved by disabling both and
shipping updates only with Tor Browser updates. The bug for HTTPS-
Everywhere is #10394 for instance.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21137#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs