[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #5761 [TorBrowserButton]: Decide if it's safe to pass the Dooble around the Tor Community
#5761: Decide if it's safe to pass the Dooble around the Tor Community
---------------------------------+------------------------------------------
Reporter: mike123 | Owner: mike123
Type: enhancement | Status: closed
Priority: normal | Milestone:
Component: TorBrowserButton | Version:
Resolution: invalid | Keywords:
Parent: | Points:
Actualpoints: |
---------------------------------+------------------------------------------
Comment(by textbrowser):
Thanks mike1234567890. You couldn't resist? Such a valiant effort for an
undeserving audience. OK, I'll be nice.
Some other thoughts.
Replaced cookies.db. The database now houses encoded values of raw forms.
One field.
For the curious, hashes that include salts offer protection against
rainbow tables.
The random passphrases have always been 256 or so bytes. They have never
been fewer than 16 bytes.
Researching the suggestion pertaining to the use of hashes of passphrases
as cipher keys.
Now discarding the provided passphrase. Poof.
Yeah. The changes were completed in a few days without a commitment from
this or any other group.
I like how some functions work. They're predictable. Logging may become
fancier and more informative.
Some YouTube videos play without enabling Web plugins.
The important conclusion is that "Doobie" isn't a bogus project. We're
still evolving, learning, twisting.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5761#comment:34>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs