[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #23719 [Applications/Tor Browser]: Make sure WebExtensions are spared from JIT disabling in higher security settings (Medium-High)
#23719: Make sure WebExtensions are spared from JIT disabling in higher security
settings (Medium-High)
--------------------------------------+-----------------------------------
Reporter: cypherpunks | Owner: tbb-team
Type: defect | Status: needs_information
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Major | Resolution:
Keywords: tbb-performance | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+-----------------------------------
Comment (by gk):
Replying to [comment:6 cypherpunks]:
> Replying to [comment:5 gk]:
> > Is that reproducible (e.g. by loading a particular URL)? I am curious
where the NoScript relation is coming from.
> Thanks for taking interest in this. It's a bit difficult to reproduce
immediately but sometimes when I'm on a page and I ctrl+click on a link so
that it opens in a new tab, the cpu usage gets to 100% on one core for
about 10sec and it's taking 20sec or so just to starting loading up the
page, from the browser console I see NoScript doing its thing (i.e. the
CSP hack) during that time. (on 8.0a9 of course) It doesn't happen always
so it's difficult to give clear ways to reproduce other than "just browse
with safer security setting and ctrl+click on links".
Is that on Windows? Or Linux? Or...
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23719#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs