[tor-bugs] #30029 [Applications/Tor Browser]: Objective 2, Activity 5: POC for Human-memorable addresses for .onion services

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue May 14 21:31:39 UTC 2019


#30029: Objective 2, Activity 5: POC for Human-memorable addresses for .onion
services
--------------------------------------+--------------------------------
 Reporter:  pili                      |          Owner:  tbb-team
     Type:  project                   |         Status:  new
 Priority:  Medium                    |      Milestone:
Component:  Applications/Tor Browser  |        Version:
 Severity:  Normal                    |     Resolution:
 Keywords:                            |  Actual Points:
Parent ID:  #30281                    |         Points:
 Reviewer:                            |        Sponsor:  Sponsor27-must
--------------------------------------+--------------------------------

Comment (by cypherpunks):

 dkg, thank you for your reply.

 Briefly, you are certainly right that Tor avoids local storage of data
 that pertain to a user's behaviour, such as cookies and history.  However,
 this is not the case for "Bookmarks", with good reason: "Bookmarks"
 represent conscious choices on the part of the user.  For this argument to
 hold in the case of Petnames, we might want to ensure that the decision to
 associate a long-lived Petname with a particular onion site is always
 conscious, and not the 'default' behaviour resulting from simply visiting
 a site.  User empowerment is key to striking the right balance: for
 example, we might consider creating Petnames by default but having them be
 ephemeral by default, like the browsing history associated with a
 particular tab, so that users would be able to make the conscious decision
 to save the association in their browsers like bookmarks if they plan to
 revisit them.  The implementation would presumably be slightly different
 to Bookmarks since it would (1) only bind onion hostnames rather than
 complete URLs and, optionally, (2) require each Petname to be (locally)
 unique.  But this could be done in addition to Bookmarks, as a similar
 data store.

 You're also right that the existence of a Petname should not affect
 network behaviour.  I am fairly certain that the existence of particular
 Bookmarks does not (non-negligibly, anyway) affect network behaviour.
 Presumably the Tor Browser developers could make sure that the 'hiding' of
 the opaque onion address and replacement with the Petname is only a
 cosmetic (UX) change to the URL bar based upon the existence or non-
 existence of Bookmark-like Petname data for the given hostname.  The Tor
 Browser developers have already decided that Bookmarks do not pose a
 fingerprinting risk; it follows that we can implement Petnames to not be a
 risk also.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30029#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list