Richard Pospesel pushed to branch base-browser-102.8.0esr-12.0-1 at The Tor Project / Applications / Tor Browser
Commits:
- 
02bb195d
by Richard Pospesel at 2023-02-15T13:54:39+00:00
1 changed file:
Changes:
| ... | ... | @@ -57,6 +57,12 @@ pref("media.memory_cache_max_size", 16384); | 
| 57 | 57 |  pref("dom.security.https_only_mode", true);
 | 
| 58 | 58 |  pref("dom.security.https_only_mode_pbm", true);
 | 
| 59 | 59 | |
| 60 | +// tor-browser#22320: Hide referer when comming from a .onion address
 | |
| 61 | +// We enable this here (rather than in Tor Browser) in case users of other
 | |
| 62 | +// base-browser derived browsers configure it to use a system Tor daemon
 | |
| 63 | +// to visit onion services.
 | |
| 64 | +pref("network.http.referer.hideOnionSource", true);
 | |
| 65 | + | |
| 60 | 66 |  // Require Safe Negotiation ( https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/27719 )
 | 
| 61 | 67 |  // Blocks connections to servers that don't support RFC 5746 [2] as they're potentially vulnerable to a
 | 
| 62 | 68 |  // MiTM attack [3]. A server without RFC 5746 can be safe from the attack if it disables renegotiations
 |