[tor-bugs] #5761 [TorBrowserButton]: Decide if it's safe to pass the Dooble around the Tor Community
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Thu May 10 01:21:58 UTC 2012
#5761: Decide if it's safe to pass the Dooble around the Tor Community
---------------------------------+------------------------------------------
Reporter: mike123 | Owner: mike123
Type: enhancement | Status: closed
Priority: normal | Milestone:
Component: TorBrowserButton | Version:
Resolution: invalid | Keywords:
Parent: | Points:
Actualpoints: |
---------------------------------+------------------------------------------
Comment(by textbrowser):
Thanks mike1234567890. You couldn't resist? Such a valiant effort for an
undeserving audience. OK, I'll be nice.
Some other thoughts.
Replaced cookies.db. The database now houses encoded values of raw forms.
One field.
For the curious, hashes that include salts offer protection against
rainbow tables.
The random passphrases have always been 256 or so bytes. They have never
been fewer than 16 bytes.
Researching the suggestion pertaining to the use of hashes of passphrases
as cipher keys.
Now discarding the provided passphrase. Poof.
Yeah. The changes were completed in a few days without a commitment from
this or any other group.
I like how some functions work. They're predictable. Logging may become
fancier and more informative.
Some YouTube videos play without enabling Web plugins.
The important conclusion is that "Doobie" isn't a bogus project. We're
still evolving, learning, twisting.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5761#comment:34>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list