[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #29957 [Applications/Tor Browser]: clicking on "click to play" media leaks URLs via NoScript on-disk preferences
#29957: clicking on "click to play" media leaks URLs via NoScript on-disk
preferences
-------------------------------------------------+-------------------------
Reporter: catalyst | Owner: tbb-
| team
Type: defect | Status:
| needs_information
Priority: High | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: tbb-disk-leak, tbb-newnym, noscript | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Comment (by ma1):
Replying to [comment:5 gk]:
> Okay, thanks for those steps that helped me a lot. Giorgio: given that
this violates assumptions about Private Browsing Mode (PBM) usage (There
should not be leaked any information about web browsing to disk in that
mode let alone possibly problematic URLs) is there a way for NoScript to
actually adhere to the PBM rules the user/Tor Browser has intentionally
enabled? Like saving the exceptions in memory and only there if in PBM? It
seems to me there is no reason to save them to disk in that case.
Yes, it can be done. I'll need to flag all permissions as temporary (maybe
if not explicitly overridden by the user some way, e.g. via an option in
the confirmation dialog) for sessions where the Tor Browser is detected as
the host.
I will put this in 11.0.25.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29957#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs