[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #25090 [Applications/Tor Browser]: Make sure IPFS & co in addons are shoved up through Tor and don't leak in ESR60
#25090: Make sure IPFS & co in addons are shoved up through Tor and don't leak in
ESR60
----------------------------------------+----------------------------
Reporter: cypherpunks | Owner: tbb-team
Type: defect | Status: closed
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution: worksforme
Keywords: ff60-esr, tbb-proxy-bypass | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
----------------------------------------+----------------------------
Changes (by gk):
* status: new => closed
* resolution: => worksforme
Comment:
I think we are good right now. There is no TCP/UDP Socket API available
for WebExtensions yet (see:
https://bugzilla.mozilla.org/show_bug.cgi?id=1247628) so, this risk is
ruled out. You can register those protocols with protocol handlers (see:
https://developer.mozilla.org/en-US/docs/Mozilla/Add-
ons/WebExtensions/manifest.json/protocol_handlers) but that's a web based
mechanism, so that should be fine.
That said: even if extensions which implemented/supported those protocols
*would* bypass Tor then I think this would fall under our strong
recommendation to not install third-party extensions as they can
compromise your privacy/anonymity.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/25090#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs