[tor-dev] UX improvement proposal #2: Encrypted bookmarks for onions

heddha heddha at unicorn.university
Thu Nov 16 14:10:25 UTC 2017

Hello George, Hello List,

I'm currently working on a Uni project where we tried to implement 3 of
the solutions suggested in the article you mentioned below. I
implemented the bookmarks idea (2.5). You can find the code here:


I implemented it as a webextension, not as part of the native bookmarks.
The entries can be exported and imported; the exported file is
aes-encrypted with a password; I used the cryptojs-library for that. The
import function has its bugs, as a webextension closes itself
automagically when another window (e.g. to select a file) is opened; I
used a workaround that's very dirty, maybe someone has a better idea?

I'd be very happy if this helped with the problem!

Kind regards,


On 16/11/17 13:52, George Kadianakis wrote:
> Hello,
> here is another onion-related UX improvement proposal. We still don't
> have a plan for how to concretely fix the onion naming issue, and we
> recently released next gen onions so names just got bigger. Ideally we
> should start experimenting with solutions sooner than later (also see
> https://blog.torproject.org/cooking-onions-names-your-onions).
> I think a local-solution akin to bookmarks makes sense to start with, so
> I opened a trac ticket today about encrypted bookmarks on Tor Browser:
>   https://trac.torproject.org/projects/tor/ticket/24310
> Please let me know if you are aware of firefox addon projects that do
> encrypted bookmarks that we could use or start basing our work on.
> Cheers!
> _______________________________________________
> tor-dev mailing list
> tor-dev at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0x3172FCAF.asc
Type: application/pgp-keys
Size: 20502 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20171116/14d629b5/attachment-0001.key>

More information about the tor-dev mailing list