Hi! Thanks a lot for TorBirdy. I've been evaluating it in practice for a while, low-intensity though, and noticed no obvious problem, but this was in no way a serious audit.
Then, I just had a quick look at the code. A few comments and questions follow. About: // Anything that would cause another proxy type to be used, we'll make them // fail closed with the following - if it can fail closed, that is! pref("network.proxy.ssl", "127.0.0.1"); pref("network.proxy.ssl_port", 8118); pref("network.proxy.http", "127.0.0.1"); pref("network.proxy.http_port", 8118); pref("network.proxy.ftp", "127.0.0.1"); pref("network.proxy.ftp_port", 8118); I don't understand why 127.0.0.1:8118 should be equivalent to "fail closed": there may very well be a non-torifying proxy (such as Privoxy) behind this port. About: // XXX: TODO --hidden-recipient should be used for each person but perhaps // --throw-keyids will be an OK stopgap? In my experience, --hidden-recipient / --throw-keyids are a pain in practice, especially for recipients that happen to handle a number of contextual identities, and OpenPGP key pairs thereof. So, I doubt it's TorBirdy's job to force this upon its users: IMHO, the (probably rare) incursions of Torbirdy into areas that are not strictly related to the stated "brings safe Tor support to Thunderbird" goal should be very careful and consensual. Cheers, -- intrigeri | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc _______________________________________________ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev