[tbb-bugs] #26019 [Applications/Tor Browser]: Allow javascript.options.ion, javascript.options.baselinejit, and javascript.options.native_regexp at the highest security level
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon May 7 09:01:32 UTC 2018
#26019: Allow javascript.options.ion, javascript.options.baselinejit, and
javascript.options.native_regexp at the highest security level
--------------------------------------+-----------------------------------
Reporter: cypherpunks | Owner: tbb-team
Type: defect | Status: needs_information
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+-----------------------------------
Changes (by gk):
* status: new => needs_information
Comment:
Differentiating between content and privileged browser with respect to JIT
preferences is not possible anymore (see:
https://bugzilla.mozilla.org/show_bug.cgi?id=939562 where the content
related prefs got removed).
I think we won't allow JIT as you suggested it in this ticket either
because the risk is that users by simply allowing scripts on certain
domains are having the JIT related things enabled, too, which is not
intended and surprising behavior. Additionally, this would leave the
"Safer" setting in a weird situation as JIT is disabled there, too, while
JavaScript is being allowed.
That said: In which way is the web browser slowed down? (Note: note every
JS-code can be JITed) Could you give some performance numbers from tests
you make?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26019#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tbb-bugs
mailing list