lists.torproject.org
Sign In Sign Up
Manage this list Sign In Sign Up

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

tbb-commits

Thread Start a new thread
Download
Threads by month
  • ----- 2025 -----
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2018 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2017 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2016 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2015 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2014 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
tbb-commits@lists.torproject.org

November 2024

  • 1 participants
  • 133 discussions
[Git][tpo/applications/mullvad-browser] Deleted tag mullvad-browser-128.5.0esr-14.0-1-build3
by ma1 (@ma1) 26 Nov '24

26 Nov '24
ma1 deleted tag mullvad-browser-128.5.0esr-14.0-1-build3 at The Tor Project / Applications / Mullvad Browser -- You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser] Pushed new tag mullvad-browser-128.5.0esr-14.0-1-build3
by ma1 (@ma1) 26 Nov '24

26 Nov '24
ma1 pushed new tag mullvad-browser-128.5.0esr-14.0-1-build3 at The Tor Project / Applications / Mullvad Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/tree/mullv… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser] Pushed new tag tor-browser-128.5.0esr-14.5-1-build3
by ma1 (@ma1) 26 Nov '24

26 Nov '24
ma1 pushed new tag tor-browser-128.5.0esr-14.5-1-build3 at The Tor Project / Applications / Tor Browser -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/tree/tor-brows… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/mullvad-browser][mullvad-browser-128.5.0esr-14.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 26 Nov '24

26 Nov '24
Pier Angelo Vendrame pushed to branch mullvad-browser-128.5.0esr-14.0-1 at The Tor Project / Applications / Mullvad Browser Commits: 53f181cb by Pier Angelo Vendrame at 2024-11-26T09:07:09+01:00 fixup! Firefox preference overrides. Bug 42125: Set and lock privacy.resistFingerprinting.exemptedDomains. The rationale for locking this is consistency with RFP. Also, set privacy.resistFingerprinting.randomDataOnCanvasExtract as a countermesure to some wrong guides. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -385,10 +385,18 @@ pref("dom.push.serverURL", ""); // Fingerprinting // tor-browser#41797: For release builds, lock RFP +// tor-browser#42125: Set (and lock in release) also exempted domains. #if MOZ_UPDATE_CHANNEL == release pref("privacy.resistFingerprinting", true, locked); +pref("privacy.resistFingerprinting.exemptedDomains", "", locked); +// tor-browser#42125: Some misleading guides suggest to set this to false, but +// the result would be that the canvas is completely white +// (see StaticPrefList.yaml), so lock it to true. +// Might be removed (MozBug 1670447). +pref("privacy.resistFingerprinting.randomDataOnCanvasExtract", true, locked); #else pref("privacy.resistFingerprinting", true); +pref("privacy.resistFingerprinting.exemptedDomains", ""); #endif // tor-browser#18603: failIfMajorPerformanceCaveat is an optional attribute that // can be used when creating a WebGL context if the browser detects that the View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/53f… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/commit/53f… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][base-browser-128.5.0esr-14.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 26 Nov '24

26 Nov '24
Pier Angelo Vendrame pushed to branch base-browser-128.5.0esr-14.0-1 at The Tor Project / Applications / Tor Browser Commits: f230a2e9 by Pier Angelo Vendrame at 2024-11-26T09:06:36+01:00 fixup! Firefox preference overrides. Bug 42125: Set and lock privacy.resistFingerprinting.exemptedDomains. The rationale for locking this is consistency with RFP. Also, set privacy.resistFingerprinting.randomDataOnCanvasExtract as a countermesure to some wrong guides. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -385,10 +385,18 @@ pref("dom.push.serverURL", ""); // Fingerprinting // tor-browser#41797: For release builds, lock RFP +// tor-browser#42125: Set (and lock in release) also exempted domains. #if MOZ_UPDATE_CHANNEL == release pref("privacy.resistFingerprinting", true, locked); +pref("privacy.resistFingerprinting.exemptedDomains", "", locked); +// tor-browser#42125: Some misleading guides suggest to set this to false, but +// the result would be that the canvas is completely white +// (see StaticPrefList.yaml), so lock it to true. +// Might be removed (MozBug 1670447). +pref("privacy.resistFingerprinting.randomDataOnCanvasExtract", true, locked); #else pref("privacy.resistFingerprinting", true); +pref("privacy.resistFingerprinting.exemptedDomains", ""); #endif // tor-browser#18603: failIfMajorPerformanceCaveat is an optional attribute that // can be used when creating a WebGL context if the browser detects that the View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/f230a2e… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/f230a2e… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser][tor-browser-128.5.0esr-14.0-1] fixup! Firefox preference overrides.
by Pier Angelo Vendrame (@pierov) 26 Nov '24

26 Nov '24
Pier Angelo Vendrame pushed to branch tor-browser-128.5.0esr-14.0-1 at The Tor Project / Applications / Tor Browser Commits: 8cad63f9 by Pier Angelo Vendrame at 2024-11-26T08:43:38+01:00 fixup! Firefox preference overrides. Bug 42125: Set and lock privacy.resistFingerprinting.exemptedDomains. The rationale for locking this is consistency with RFP. Also, set privacy.resistFingerprinting.randomDataOnCanvasExtract as a countermesure to some wrong guides. - - - - - 1 changed file: - browser/app/profile/001-base-profile.js Changes: ===================================== browser/app/profile/001-base-profile.js ===================================== @@ -385,10 +385,18 @@ pref("dom.push.serverURL", ""); // Fingerprinting // tor-browser#41797: For release builds, lock RFP +// tor-browser#42125: Set (and lock in release) also exempted domains. #if MOZ_UPDATE_CHANNEL == release pref("privacy.resistFingerprinting", true, locked); +pref("privacy.resistFingerprinting.exemptedDomains", "", locked); +// tor-browser#42125: Some misleading guides suggest to set this to false, but +// the result would be that the canvas is completely white +// (see StaticPrefList.yaml), so lock it to true. +// Might be removed (MozBug 1670447). +pref("privacy.resistFingerprinting.randomDataOnCanvasExtract", true, locked); #else pref("privacy.resistFingerprinting", true); +pref("privacy.resistFingerprinting.exemptedDomains", ""); #endif // tor-browser#18603: failIfMajorPerformanceCaveat is an optional attribute that // can be used when creating a WebGL context if the browser detects that the View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8cad63f… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8cad63f… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-update-responses][main] 2 commits: release: new version, 14.0.3
by morgan (@morgan) 26 Nov '24

26 Nov '24
morgan pushed to branch main at The Tor Project / Applications / Tor Browser update responses Commits: 991e6085 by Morgan at 2024-11-26T01:39:12+00:00 release: new version, 14.0.3 - - - - - bdc9a0d9 by Morgan at 2024-11-26T03:19:50+00:00 release: new version, 14.0.3 - - - - - 30 changed files: - update_3/release/.htaccess - − update_3/release/13.5.5-14.0.2+13.5.9-linux-i686-ALL.xml - − update_3/release/13.5.5-14.0.2+13.5.9-linux-x86_64-ALL.xml - − update_3/release/13.5.5-14.0.2+13.5.9-macos-ALL.xml - − update_3/release/13.5.5-14.0.2+13.5.9-windows-i686-ALL.xml - − update_3/release/13.5.5-14.0.2+13.5.9-windows-x86_64-ALL.xml - − update_3/release/13.5.6-14.0.2+13.5.9-linux-i686-ALL.xml - − update_3/release/13.5.6-14.0.2+13.5.9-linux-x86_64-ALL.xml - − update_3/release/13.5.6-14.0.2+13.5.9-macos-ALL.xml - − update_3/release/13.5.6-14.0.2+13.5.9-windows-i686-ALL.xml - − update_3/release/13.5.6-14.0.2+13.5.9-windows-x86_64-ALL.xml - − update_3/release/13.5.7-14.0.2+13.5.9-linux-i686-ALL.xml - − update_3/release/13.5.7-14.0.2+13.5.9-linux-x86_64-ALL.xml - − update_3/release/13.5.7-14.0.2+13.5.9-macos-ALL.xml - − update_3/release/13.5.7-14.0.2+13.5.9-windows-i686-ALL.xml - − update_3/release/13.5.7-14.0.2+13.5.9-windows-x86_64-ALL.xml - + update_3/release/13.5.7-14.0.3+13.5.10-linux-i686-ALL.xml - + update_3/release/13.5.7-14.0.3+13.5.10-linux-x86_64-ALL.xml - + update_3/release/13.5.7-14.0.3+13.5.10-macos-ALL.xml - + update_3/release/13.5.7-14.0.3+13.5.10-windows-i686-ALL.xml - + update_3/release/13.5.7-14.0.3+13.5.10-windows-x86_64-ALL.xml - + update_3/release/13.5.9-14.0.3+13.5.10-linux-i686-ALL.xml - + update_3/release/13.5.9-14.0.3+13.5.10-linux-x86_64-ALL.xml - + update_3/release/13.5.9-14.0.3+13.5.10-macos-ALL.xml - + update_3/release/13.5.9-14.0.3+13.5.10-windows-i686-ALL.xml - + update_3/release/13.5.9-14.0.3+13.5.10-windows-x86_64-ALL.xml - − update_3/release/14.0-14.0.2+13.5.9-linux-i686-ALL.xml - − update_3/release/14.0-14.0.2+13.5.9-linux-x86_64-ALL.xml - − update_3/release/14.0-14.0.2+13.5.9-macos-ALL.xml - − update_3/release/14.0-14.0.2+13.5.9-windows-i686-ALL.xml The diff was not included because it is too large. View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-update-responses… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-update-responses… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][main] Update Tor Browser Stable's Release-Prep template to include missing legacy params in rbm.conf
by morgan (@morgan) 26 Nov '24

26 Nov '24
morgan pushed to branch main at The Tor Project / Applications / tor-browser-build Commits: 0f3965af by Morgan at 2024-11-26T02:47:41+00:00 Update Tor Browser Stable's Release-Prep template to include missing legacy params in rbm.conf - - - - - 1 changed file: - .gitlab/issue_templates/Release Prep - Tor Browser Stable.md Changes: ===================================== .gitlab/issue_templates/Release Prep - Tor Browser Stable.md ===================================== @@ -68,6 +68,8 @@ Tor Browser Stable is on the `maint-${TOR_BROWSER_MAJOR}.${TOR_BROWSER_MINOR}` b - [ ] ***(Desktop Only)*** `var/torbrowser_incremental_from`: updated to previous Desktop version - **NOTE**: We try to build incrementals for the previous 3 desktop versions - **⚠️ WARNING**: Really *actually* make sure this is the previous Desktop version or else the `make torbrowser-incrementals-*` step will fail + - [ ] `var/torbrowser_legacy_version`: updated to latest legacy Tor Browser version + - [ ] `var/torbrowser_legacy_platform_version`: updated to latest legacy Tor Browser ESR version - [ ] `projects/firefox/config` - [ ] `browser_build`: updated to match `tor-browser` tag - [ ] ***(Optional)*** `var/firefox_platform_version`: updated to latest `${ESR_VERSION}` if rebased View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/0… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/0… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build] Pushed new tag tbb-14.0.3-build2
by morgan (@morgan) 26 Nov '24

26 Nov '24
morgan pushed new tag tbb-14.0.3-build2 at The Tor Project / Applications / tor-browser-build -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/tree/tbb… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
[Git][tpo/applications/tor-browser-build][maint-14.0] Bug 41301: Prepare Tor Browser 14.0.3 part 2
by morgan (@morgan) 26 Nov '24

26 Nov '24
morgan pushed to branch maint-14.0 at The Tor Project / Applications / tor-browser-build Commits: f605e288 by Morgan at 2024-11-26T02:24:45+00:00 Bug 41301: Prepare Tor Browser 14.0.3 part 2 - fix legacy torbrowser mar generation - - - - - 1 changed file: - rbm.conf Changes: ===================================== rbm.conf ===================================== @@ -74,7 +74,7 @@ buildconf: var: torbrowser_version: '14.0.3' - torbrowser_build: 'build1' + torbrowser_build: 'build2' # This should be the date of when the build is started. For the build # to be reproducible, browser_release_date should always be in the past. browser_release_date: '2024/11/25 15:42:04' @@ -89,8 +89,8 @@ var: - '[% IF c("var/mullvad-browser") %]13.5.7[% END %]' mar_channel_id: '[% c("var/projectname") %]-torproject-[% c("var/channel") %]' - torbrowser_legacy_version: 13.5.9 - torbrowser_legacy_platform_version: 115.17.0 + torbrowser_legacy_version: 13.5.10 + torbrowser_legacy_platform_version: 115.18.0 # By default, we sort the list of installed packages. This allows sharing # containers with identical list of packages, even if they are not listed View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/f… -- View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/f… You're receiving this email because of your account on gitlab.torproject.org.
1 0
0 0
  • ← Newer
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 14
  • Older →

HyperKitty Powered by HyperKitty version 1.3.12.