#21321: .onion HTTP is shown as non-secure in Tor Browser
-------------------------------------------------+-------------------------
 Reporter:  cypherpunks                          |          Owner:  tbb-
                                                 |  team
     Type:  task                                 |         Status:  closed
 Priority:  High                                 |      Milestone:
Component:  Applications/Tor Browser             |        Version:
 Severity:  Blocker                              |     Resolution:  fixed
 Keywords:  ff52-esr, tbb-7.0-issues, tbb-       |  Actual Points:
  usability, ux-team, tbb-7.0-frequent,          |
  TorBrowserTeam201708R, GeorgKoppen201708       |
Parent ID:                                       |         Points:
 Reviewer:                                       |        Sponsor:
-------------------------------------------------+-------------------------

Comment (by cypherpunks):

 Replying to [comment:45 gk]:
 > But we might be able to bypass that hassle by using other means provided
 in that spec, in particular treating .onions as potentially trustworthy
 origins (https://w3c.github.io/webappsec-secure-contexts/#is-origin-
 trustworthy):
 Make an encrypted channel between Tor and Tor Browser to get
 > A potentially trustworthy origin is one which a user agent can generally
 trust as delivering data securely.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21321#comment:54>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Reply via email to