[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #16221 [Tor Browser]: Investiate WebRTC with TCP-ICE and hidden services
#16221: Investiate WebRTC with TCP-ICE and hidden services
-----------------------------+----------------------
Reporter: mikeperry | Owner: tbb-team
Type: enhancement | Status: new
Priority: normal | Milestone:
Component: Tor Browser | Version:
Resolution: | Keywords: ff38-esr
Actual Points: | Parent ID:
Points: |
-----------------------------+----------------------
Comment (by cypherpunks):
Replying to [comment:3 mikeperry]:
> Skimming some docs makes it seem like it may be possible to advertise a
non-running HS address before agreeing to use it
Is this just to prevent hidden services from being silently created when
the user doesn't want them?
I don't think it's necessary or desirable to do something with an
ephemeral onion address before publishing its descriptor to the HSDirs.
Instead, I think when a website tries to initiate WebRTC in Tor Browser it
should initially fail (as it does now) but prompt the user (with the
standard permissions prompt, like it does for canvas reads) asking
something like "Do you want to allow incoming connections to your browser
while you're viewing this site?". If the user says yes, an ephemeral onion
should be created and the page should reload.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16221#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs