[tor-bugs] #5761 [TorBrowserButton]: Decide if it's safe to pass the Dooble around the Tor Community

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Thu May 10 01:21:58 UTC 2012


#5761: Decide if it's safe to pass the Dooble around the Tor Community
---------------------------------+------------------------------------------
    Reporter:  mike123           |       Owner:  mike123
        Type:  enhancement       |      Status:  closed 
    Priority:  normal            |   Milestone:         
   Component:  TorBrowserButton  |     Version:         
  Resolution:  invalid           |    Keywords:         
      Parent:                    |      Points:         
Actualpoints:                    |  
---------------------------------+------------------------------------------

Comment(by textbrowser):

 Thanks mike1234567890. You couldn't resist? Such a valiant effort for an
 undeserving audience. OK, I'll be nice.

 Some other thoughts.

 Replaced cookies.db. The database now houses encoded values of raw forms.
 One field.

 For the curious, hashes that include salts offer protection against
 rainbow tables.

 The random passphrases have always been 256 or so bytes. They have never
 been fewer than 16 bytes.

 Researching the suggestion pertaining to the use of hashes of passphrases
 as cipher keys.

 Now discarding the provided passphrase. Poof.

 Yeah. The changes were completed in a few days without a commitment from
 this or any other group.

 I like how some functions work. They're predictable. Logging may become
 fancier and more informative.

 Some YouTube videos play without enabling Web plugins.

 The important conclusion is that "Doobie" isn't a bogus project. We're
 still evolving, learning, twisting.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5761#comment:34>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list