#4286: We cannot detect JavaScript redirection loops
----------------------------------+-----------------------------------------
 Reporter:  pde                   |          Owner:  pde
     Type:  defect                |         Status:  new
 Priority:  normal                |      Milestone:     
Component:  EFF-HTTPS Everywhere  |        Version:     
 Keywords:                        |         Parent:     
   Points:                        |   Actualpoints:     
----------------------------------+-----------------------------------------

Comment(by pde):

 Could we maybe wrap the call(s) that Content uses to perform these
 redirects?  This seems conceptually similar to what Jonathan Mayer did
 with[http://fourthparty.info/ fourth party]
 
[https://github.com/fourthparty/fourthparty/tree/038c04fa90c76913754f7877337b8b72f4eadbb5/extension/lib
 (code here)] to detect fingerprinting and other nefarious !JavaScript,
 although I think he is using Jetpack.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4286#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Reply via email to