[tor-bugs] #5761 [TorBrowserButton]: Decide if it's safe to pass the Dooble around the Tor Community

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Sun May 6 01:10:49 UTC 2012


#5761: Decide if it's safe to pass the Dooble around the Tor Community
---------------------------------+------------------------------------------
    Reporter:  mike123           |       Owner:  mike123
        Type:  enhancement       |      Status:  closed 
    Priority:  normal            |   Milestone:         
   Component:  TorBrowserButton  |     Version:         
  Resolution:  invalid           |    Keywords:         
      Parent:                    |      Points:         
Actualpoints:                    |  
---------------------------------+------------------------------------------

Comment(by textbrowser):

 There is a very valid reason for storing passphrase hashes. If a user
 enters a temporary-session mode, some data is recorded in order to satisfy
 visual containers. Such containers are populated by reading and decoding
 values from databases. Dooble needs to know which values belong to that
 session and it does so by using passphrase hashes. Instead of a hash, a
 boolean could be used to indicate that the data is temporary. However,
 that is not the current case.

 Error-proofing encodedString() is not a simple task. It is understood to
 tolerate failure. I've noted your suggestion.

 Enjoy playing with Fire.

 It's been a hoot. Bye.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5761#comment:31>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list