[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #26019 [Applications/Tor Browser]: Allow javascript.options.ion, javascript.options.baselinejit, and javascript.options.native_regexp at the highest security level
#26019: Allow javascript.options.ion, javascript.options.baselinejit, and
javascript.options.native_regexp at the highest security level
--------------------------------------+-----------------------------------
Reporter: cypherpunks | Owner: tbb-team
Type: defect | Status: needs_information
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+-----------------------------------
Changes (by gk):
* status: new => needs_information
Comment:
Differentiating between content and privileged browser with respect to JIT
preferences is not possible anymore (see:
https://bugzilla.mozilla.org/show_bug.cgi?id=939562 where the content
related prefs got removed).
I think we won't allow JIT as you suggested it in this ticket either
because the risk is that users by simply allowing scripts on certain
domains are having the JIT related things enabled, too, which is not
intended and surprising behavior. Additionally, this would leave the
"Safer" setting in a weird situation as JIT is disabled there, too, while
JavaScript is being allowed.
That said: In which way is the web browser slowed down? (Note: note every
JS-code can be JITed) Could you give some performance numbers from tests
you make?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26019#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs