[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] Rethinking Bad Exit Defences: Highlighting insecure and sensitive content in Tor Browser



Tom Ritter:
> It seems reasonable but my first question is the UI. Do you have a
> proposal?  The password field UI works, in my opinion, because it
> shows up when the password field is focused on. Assuming one uses the
> mouse to click on it (and doesn't tab to it from the username) - they
> see it.
> 
> How would you communicate this for .onion links or bitcoin text? These
> fields are static text and would not be interacted with in the same
> way as a password field.
> 
> A link could indeed be clicked - so that's a hook for UX... A bitcoin
> address would probably be highlighted for copying so that's another
> hook... But what should it do?

Thank you all for the suggestions in this thread. I agree that we need
to tie down a preliminary UI. I'm seeing two key hooks that we could use:

* Detecting navigation from an insecure page to an onion URL or
bitcoin:// address.
* Reading and alerting to Bitcoin or onion addresses in the clipboard
buffer.

I've been working on a proof-of-concept extension which implements both
of these hooks.

The "clipboardRead" permission is needed to read the contents of the
clipboard from a Firefox extension. This was implemented in Firefox 54
(2017-02-13) in Mozilla bug #1312260 [1]. Unfortunately it will be quite
some time before Firefox 54 is included in an ESR release. The Mozilla
patch for this permission is < 100 lines. Is this a feature that the TBB
team might consider back-porting to Tor Browser?

I agree with David, this UI should be as intrusive as possible to
prevent users from shooting themselves in the foot. IMO navigation to
onion URLs from HTTP should be completely blocked. I also think that we
should wipe the users clipboard buffer if we detect a valid Bitcoin
address in it.

The UI could suggest that a user manually retypes the Bitcoin or onion
address if they are certain that it is correct. I hope this type of
intrusive warning will reduce risky behaviour and encourage any Tor
related web services to move to TLS only.

I'll try to report back with a demo for testing next week. Please reply
if you have any comments or suggestions.

Regards,
Donncha

[1] https://bugzilla.mozilla.org/show_bug.cgi?id=1312260


Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev