[tor-bugs] #28507 [Applications/Tor Browser]: TBA: Set privacy preferences

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Nov 19 12:00:15 UTC 2018


#28507: TBA: Set privacy preferences
---------------------------------------+--------------------------
 Reporter:  igt0                       |          Owner:  tbb-team
     Type:  defect                     |         Status:  new
 Priority:  High                       |      Milestone:
Component:  Applications/Tor Browser   |        Version:
 Severity:  Normal                     |     Resolution:
 Keywords:  tbb-mobile, tbb-disk-leak  |  Actual Points:
Parent ID:                             |         Points:
 Reviewer:                             |        Sponsor:
---------------------------------------+--------------------------

Comment (by igt0):

 Looking the:

 https://gitweb.torproject.org/tor-browser.git/commit/?h=tor-
 browser-60.3.0esr-8.5-1&id=ebf9fc1ac446a70aa2025ebe4696a8cc5fdce525

 And the code that uses it. Android just updates the prefs when the user
 manually clicks in the "Set" button. We can use the distribution
 preferences to forcefully update them.

 However, we have other problem. If the user closes the browser without
 clicking in the quit button in the TBA menu, the {{{sanitize}}} method in
 the browser.js is not called and the TBA doesn't delete any session
 information.

 Replying to [comment:2 sysrqb]:
 > Isn't this why we set the GeckoPreferences prefs? Or, is this not
 working?
 >
 > https://gitweb.torproject.org/tor-browser.git/commit/?h=tor-
 browser-60.3.0esr-8.5-1&id=312abcdb8d1dc2238296efb170a8b4af9db18c77
 >
 > https://gitweb.torproject.org/tor-browser.git/commit/?h=tor-
 browser-60.3.0esr-8.5-1&id=ebf9fc1ac446a70aa2025ebe4696a8cc5fdce525
 >
 > Also, I think we decided we don't want to clear downloads on exit
 because this is the same behavior as desktop.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28507#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list