[tor-bugs] #24054 [Applications/Tor Browser]: Prevent Tor Browser from being used as a Javascript Miner

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Oct 30 18:14:27 UTC 2017


#24054: Prevent Tor Browser from being used as a Javascript Miner
--------------------------------------+---------------------------
 Reporter:  naif                      |          Owner:  tbb-team
     Type:  enhancement               |         Status:  closed
 Priority:  Medium                    |      Milestone:
Component:  Applications/Tor Browser  |        Version:
 Severity:  Normal                    |     Resolution:  not a bug
 Keywords:                            |  Actual Points:
Parent ID:                            |         Points:
 Reviewer:                            |        Sponsor:
--------------------------------------+---------------------------

Comment (by cypherpunks):

 Replying to [comment:7 gk]:
 > Replying to [comment:4 cypherpunks]:
 > > >This is part of #17569
 > >
 > > It's not. And I advise against adding uBlock or uMatrix.
 >
 > Indeed. (see our current design document in that regard: section 5. No
 filters in
 https://www.torproject.org/projects/torbrowser/design/#philosophy)

 That document says that Tor Browser should provide a "general [solution]
 that prevent[s] tracking by all third parties (the solution being: first
 party isolation, antifingerprinting...etc), rather than [through blocking]
 a list of specific URLs or hosts", how does that imply that blocking some
 URLs or hosts *for non-privacy related reasons* (usability, but mainly
 performance and security) should be avoided? Am I interpreting the
 document correctly?

 Also you're going to work next year on a Tor Browser build for mobile on
 Android, at that point it would be difficult to argue against blocking a
 certain set of URLs despite the performance gains and in view of
 ameliorating battery usage.

 Replying to [comment:9 meejah]:
 > It's not the "JS cryptocurrency mining" that's the problem

 You're mostly correct in those paragraphs but it's indeed a problem on its
 own if I use the Medium security setting (where performance optimizations
 such as JIT are disabled) and that website that serves that JS crypto
 miner starts using - without my consent - 100% of my CPU core, starts
 draining my laptop battery, and lags my browser. What if I use Orfox on a
 smartphone (with less CPU horsepower) with Medium security setting and I
 happen on such site? This can definitely become a deterrent for people to
 use the medium security setting (or the high one with JS enabled). In
 fact, even with JS optimizations enabled this can be a problem with older
 hardware, as well as smartphones. (Off-topic: there are consent based JS
 miners such as https://authedmine.com/ that aren't blocked by adblockers)

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24054#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list