Hello,
Edge Vuln Research just dropped the amazing named "Super Duper Secure Mode" [1]---an interesting albeit slightly provocative statement they make in the announcement is that JITs may not be worth it for security-sensitive users, since they account for about half the bugs in V8 (Chromium's JS engine) and their new research shows that disabling JITs, despite the huge performance regressions in traditional JS benchmarks, is rarely noticeable in real-life. I don't think tbb is new to clamping down JS (for security-sensitive users), but this idea of disabling JITs might be interesting to look into*.
First, taking a step back, recall that modern browsers execute JS
by converting it into bytecode and then using an interpreter to
execute, and functions that are "hot" (executed many times) are
recompiled using a JIT to produce faster code. This is super
simplified, see [2] for a more technical overview of how this
works in Firefox.
I think this idea can be used to improve the Tor Browser,
On a more meta note, this wouldn't be hard to implement, Firefox
has prefs to enable and disable this stuff, and @freddyb's tweet
[3] seems to confirm this intuition.
What do y'all think?
Best,
Sanketh
*disabling JITs was discussed in the tor issue tracker 4 years ago [4] but most of the then concerns (like changing build settings) seem to have been resolved and JITs are now enabled across the browser (they were not enabled for content back then) and so this, I feel, can use fresh eyes.
[1]:
https://microsoftedge.github.io/edgevr/posts/Super-Duper-Secure-Mode/
[2]:
https://hacks.mozilla.org/2020/11/warp-improved-js-performance-in-firefox-83/
[3]: https://twitter.com/freddyb/status/1423020386560712705?s=20
[4]: https://gitlab.torproject.org/legacy/trac/-/issues/21011