[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #27313 [Applications/Tor Browser]: Help NoScript marking HTTP .onions as secure
#27313: Help NoScript marking HTTP .onions as secure
------------------------------------------+----------------------
Reporter: gk | Owner: tbb-team
Type: enhancement | Status: new
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Keywords:
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
------------------------------------------+----------------------
#27307 is a report that NoScript shows HTTP .onions in red (compared to
HTTPS ones in green). Giorgio would be happy to change that. We should
think about a good way signaling NoScript that it is running in Tor
Browser as it could then treat .onion domains differently.
Giorgio's suggestion was:
{{{
>
> > console.log(await browser.runtime.getBrowserInfo())
>
> Object { name: "Firefox", vendor: "Mozilla", version: "60.1.0", buildID:
"20180204020101" }
>
>
> Maybe you could send an "isTorBrowser: true" additional property within
your updateSettings messages.
}}}
There might be other ones we could consider
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27313>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs