[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #28015 [Applications/Tor Browser]: Brainstorm improved ux for orgs that want to give bridges to their people
#28015: Brainstorm improved ux for orgs that want to give bridges to their people
--------------------------------------+--------------------------
Reporter: arma | Owner: tbb-team
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: ux-team, sponsor19 | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+--------------------------
Comment (by tom):
Your ideas were the first that came to my mind. I wracked my brain for a
little bit trying to come up with additional ones.
Ideas of varying quality:
Instead of 'via email, and then manually clicking a bunch of things in Tor
Browser and pasting the bridges into the right place' - make this a
supported flow where on copy/pastes a big blob of base64 and Tor Browser
decodes and parses it and does all the right things.
Orgs distribute a symmetric key that decrypts an encrypted blob baked into
the browser. This contains some or all of: a passphrase used to get secret
bridges from our moat, the location of their moat, or even new default
bridges. (This could be used by Tor Projects direct user support to test
connection failures also, by having a few of our own secret bridges)
Org distributes an 'add-on pack' (but not a browser add-on in that sense,
just the generic definition of 'supplemental') that one installs on top of
tor browser that contains *something*. A new moat url, new default
bridges, etc. The 'add-on pack' might be as simple as a specially named
json file Tor Browser looks for in its startup process. You could even
encrypt it by default with a passphrase Tor browser prompts you for on
startup if you really wanted to?
Orgs could distribute a true browser add-on one installs over Tor Browser
that alter's Tor Browser's behavior in the same sense of a Mozilla Partner
Repack (as we call them): it could supply bridge info, but also theme the
browser, add a default homepage, bookmarks, even add-ons. (Or maybe not
add-ons :) ) I think Psiphon did this as a funding mechanism also.
Tangential: a 'secret passphrase with a public moat URL' approach could
also have two other authentication mechanisms besides a high-entropy
passphrase: a TOTP based token o a WebAuth/FIDO USB Key.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28015#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs