commit 8a84d411fee313398a97347c33bf75d97e93d6f6
Author: Georg Koppen <[email protected]>
Date: Fri Jun 15 15:42:13 2018 +0000
Fix typo in design doc
Thanks to nusenu for pointing to the wrong URL.
---
projects/torbrowser/design/index.html.en | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/projects/torbrowser/design/index.html.en
b/projects/torbrowser/design/index.html.en
index d1fa9fc0..002dbed4 100644
--- a/projects/torbrowser/design/index.html.en
+++ b/projects/torbrowser/design/index.html.en
@@ -1,5 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html
xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type"
content="text/html; charset=UTF-8" /><title>The Design and Implementation of
the Tor Browser [DRAFT]</title><meta name="generator" content="DocBook XSL
Stylesheets V1.79.1" /></head><body><div class="article"><div
class="titlepage"><div><div><h2 class="title"><a id="design"></a>The Design and
Implementation of the Tor Browser [DRAFT]</h2></div><div><div
class="author"><h3 class="author"><span class="firstname">Mike</span> <span
class="surname">Perry</span></h3><div class="affiliation"><div
class="address"><p><code class="email"><<a class="email"
href="mailto:mikeperry#torproject org">mikeperry#torprojectÂ
org</a>></code></p></div></div></div></div><div><div class="author"><h3
class="author"><span class="firstname">Erinn</span> <span
class="surname">Clark</span></h3><div class="a
ffiliation"><div class="address"><p><code class="email"><<a class="email"
href="mailto:erinn#torproject org">erinn#torprojectÂ
org</a>></code></p></div></div></div></div><div><div class="author"><h3
class="author"><span class="firstname">Steven</span> <span
class="surname">Murdoch</span></h3><div class="affiliation"><div
class="address"><p><code class="email"><<a class="email"
href="mailto:sjmurdoch#torproject org">sjmurdoch#torprojectÂ
org</a>></code></p></div></div></div></div><div><div class="author"><h3
class="author"><span class="firstname">Georg</span> <span
class="surname">Koppen</span></h3><div class="affiliation"><div
class="address"><p><code class="email"><<a class="email"
href="mailto:gk#torproject org">gk#torprojectÂ
org</a>></code></p></div></div></div></div><div><p class="pubdate">May 15,
2018</p></div></div><hr /></div><div class="toc"><p><strong>Table of
Contents</strong></p><dl class="toc"><dt><span class="sect1"><a
href="#idm29">1. Introduction</a
></span></dt><dd><dl><dt><span class="sect2"><a href="#components">1.1.
>Browser Component Overview</a></span></dt></dl></dd><dt><span
>class="sect1"><a href="#DesignRequirements">2. Design Requirements and
>Philosophy</a></span></dt><dd><dl><dt><span class="sect2"><a
>href="#security">2.1. Security Requirements</a></span></dt><dt><span
>class="sect2"><a href="#privacy">2.2. Privacy
>Requirements</a></span></dt><dt><span class="sect2"><a
>href="#philosophy">2.3. Philosophy</a></span></dt></dl></dd><dt><span
>class="sect1"><a href="#adversary">3. Adversary
>Model</a></span></dt><dd><dl><dt><span class="sect2"><a
>href="#adversary-goals">3.1. Adversary Goals</a></span></dt><dt><span
>class="sect2"><a href="#adversary-positioning">3.2. Adversary Capabilities -
>Positioning</a></span></dt><dt><span class="sect2"><a href="#attacks">3.3.
>Adversary Capabilities - Attacks</a></span></dt></dl></dd><dt><span
>class="sect1"><a href="#Implementation">4.
>Implementation</a></span></dt><dd><dl><dt><span class=
"sect2"><a href="#proxy-obedience">4.1. Proxy
Obedience</a></span></dt><dt><span class="sect2"><a
href="#state-separation">4.2. State Separation</a></span></dt><dt><span
class="sect2"><a href="#disk-avoidance">4.3. Disk
Avoidance</a></span></dt><dt><span class="sect2"><a
href="#app-data-isolation">4.4. Application Data
Isolation</a></span></dt><dt><span class="sect2"><a
href="#identifier-linkability">4.5. Cross-Origin Identifier
Unlinkability</a></span></dt><dt><span class="sect2"><a
href="#fingerprinting-linkability">4.6. Cross-Origin Fingerprinting
Unlinkability</a></span></dt><dt><span class="sect2"><a
href="#new-identity">4.7. Long-Term Unlinkability via "New Identity"
button</a></span></dt><dt><span class="sect2"><a href="#other-security">4.8.
Other Security Measures</a></span></dt></dl></dd><dt><span class="sect1"><a
href="#BuildSecurity">5. Build Security and Package
Integrity</a></span></dt><dd><dl><dt><span class="sect2"><a
href="#idm1164">5.1. Achieving Binary Reproducibil
ity</a></span></dt><dt><span class="sect2"><a href="#idm1196">5.2. Package
Signatures and Verification</a></span></dt><dt><span class="sect2"><a
href="#idm1203">5.3. Anonymous Verification</a></span></dt><dt><span
class="sect2"><a href="#update-safety">5.4. Update
Safety</a></span></dt></dl></dd><dt><span class="appendix"><a
href="#Transparency">A. Towards Transparency in Navigation
Tracking</a></span></dt><dd><dl><dt><span class="sect1"><a
href="#deprecate">A.1. Deprecation Wishlist</a></span></dt><dt><span
class="sect1"><a href="#idm1246">A.2. Promising
Standards</a></span></dt></dl></dd></dl></div><div class="sect1"><div
class="titlepage"><div><div><h2 class="title" style="clear: both"><a
id="idm29"></a>1. Introduction</h2></div></div></div><p>
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html
xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type"
content="text/html; charset=UTF-8" /><title>The Design and Implementation of
the Tor Browser [DRAFT]</title><meta name="generator" content="DocBook XSL
Stylesheets V1.79.1" /></head><body><div class="article"><div
class="titlepage"><div><div><h2 class="title"><a id="design"></a>The Design and
Implementation of the Tor Browser [DRAFT]</h2></div><div><div
class="author"><h3 class="author"><span class="firstname">Mike</span> <span
class="surname">Perry</span></h3><div class="affiliation"><div
class="address"><p><code class="email"><<a class="email"
href="mailto:mikeperry#torproject org">mikeperry#torprojectÂ
org</a>></code></p></div></div></div></div><div><div class="author"><h3
class="author"><span class="firstname">Erinn</span> <span
class="surname">Clark</span></h3><div class="a
ffiliation"><div class="address"><p><code class="email"><<a class="email"
href="mailto:erinn#torproject org">erinn#torprojectÂ
org</a>></code></p></div></div></div></div><div><div class="author"><h3
class="author"><span class="firstname">Steven</span> <span
class="surname">Murdoch</span></h3><div class="affiliation"><div
class="address"><p><code class="email"><<a class="email"
href="mailto:sjmurdoch#torproject org">sjmurdoch#torprojectÂ
org</a>></code></p></div></div></div></div><div><div class="author"><h3
class="author"><span class="firstname">Georg</span> <span
class="surname">Koppen</span></h3><div class="affiliation"><div
class="address"><p><code class="email"><<a class="email"
href="mailto:gk#torproject org">gk#torprojectÂ
org</a>></code></p></div></div></div></div><div><p class="pubdate">June 15,
2018</p></div></div><hr /></div><div class="toc"><p><strong>Table of
Contents</strong></p><dl class="toc"><dt><span class="sect1"><a
href="#idm29">1. Introduction</
a></span></dt><dd><dl><dt><span class="sect2"><a href="#components">1.1.
Browser Component Overview</a></span></dt></dl></dd><dt><span class="sect1"><a
href="#DesignRequirements">2. Design Requirements and
Philosophy</a></span></dt><dd><dl><dt><span class="sect2"><a
href="#security">2.1. Security Requirements</a></span></dt><dt><span
class="sect2"><a href="#privacy">2.2. Privacy
Requirements</a></span></dt><dt><span class="sect2"><a href="#philosophy">2.3.
Philosophy</a></span></dt></dl></dd><dt><span class="sect1"><a
href="#adversary">3. Adversary Model</a></span></dt><dd><dl><dt><span
class="sect2"><a href="#adversary-goals">3.1. Adversary
Goals</a></span></dt><dt><span class="sect2"><a
href="#adversary-positioning">3.2. Adversary Capabilities -
Positioning</a></span></dt><dt><span class="sect2"><a href="#attacks">3.3.
Adversary Capabilities - Attacks</a></span></dt></dl></dd><dt><span
class="sect1"><a href="#Implementation">4.
Implementation</a></span></dt><dd><dl><dt><span class
="sect2"><a href="#proxy-obedience">4.1. Proxy
Obedience</a></span></dt><dt><span class="sect2"><a
href="#state-separation">4.2. State Separation</a></span></dt><dt><span
class="sect2"><a href="#disk-avoidance">4.3. Disk
Avoidance</a></span></dt><dt><span class="sect2"><a
href="#app-data-isolation">4.4. Application Data
Isolation</a></span></dt><dt><span class="sect2"><a
href="#identifier-linkability">4.5. Cross-Origin Identifier
Unlinkability</a></span></dt><dt><span class="sect2"><a
href="#fingerprinting-linkability">4.6. Cross-Origin Fingerprinting
Unlinkability</a></span></dt><dt><span class="sect2"><a
href="#new-identity">4.7. Long-Term Unlinkability via "New Identity"
button</a></span></dt><dt><span class="sect2"><a href="#other-security">4.8.
Other Security Measures</a></span></dt></dl></dd><dt><span class="sect1"><a
href="#BuildSecurity">5. Build Security and Package
Integrity</a></span></dt><dd><dl><dt><span class="sect2"><a
href="#idm1164">5.1. Achieving Binary Reproducibi
lity</a></span></dt><dt><span class="sect2"><a href="#idm1196">5.2. Package
Signatures and Verification</a></span></dt><dt><span class="sect2"><a
href="#idm1203">5.3. Anonymous Verification</a></span></dt><dt><span
class="sect2"><a href="#update-safety">5.4. Update
Safety</a></span></dt></dl></dd><dt><span class="appendix"><a
href="#Transparency">A. Towards Transparency in Navigation
Tracking</a></span></dt><dd><dl><dt><span class="sect1"><a
href="#deprecate">A.1. Deprecation Wishlist</a></span></dt><dt><span
class="sect1"><a href="#idm1246">A.2. Promising
Standards</a></span></dt></dl></dd></dl></div><div class="sect1"><div
class="titlepage"><div><div><h2 class="title" style="clear: both"><a
id="idm29"></a>1. Introduction</h2></div></div></div><p>
This document describes the <a class="link" href="#adversary" title="3.Â
Adversary Model">adversary model</a>,
<a class="link" href="#DesignRequirements" title="2. Design Requirements and
Philosophy">design requirements</a>, and <a class="link" href="#Implementation"
title="4. Implementation">implementation</a> of the Tor Browser. It is
current as of Tor Browser
@@ -964,7 +964,7 @@ While the vast majority of web requests adheres to the
circuit and connection
unlinkability requirement there are still corner cases we
<a class="ulink"
href="https://gitweb.torproject.org/tor-browser.git/commit/?h=tor-browser-52.5.2esr-7.0-2&id=8661822237c56d543d5c9117c8a4708c402a110f"
target="_top">
need to treat separately</a> or that
-<a class="ulink" href="" target="_top">lack a fix altogether</a>.
+<a class="ulink" href="https://bugs.torproject.org/22343" target="_top">lack a
fix altogether</a>.
</p></li><li class="listitem"><span
class="command"><strong>SharedWorkers</strong></span><p>
<a class="ulink"
href="https://developer.mozilla.org/en-US/docs/Web/API/SharedWorker"
target="_top">SharedWorkers</a>
_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits