richard pushed to branch main at The Tor Project / Applications / tor-browser-build
Commits:
debb3452 by Richard Pospesel at 2024-03-27T17:41:10+00:00
Bug 41094,41095: Tor,Mullvad Browser 13.5a6 Release Prep
- - - - -
12 changed files:
- projects/browser/Bundle-Data/Docs-MB/ChangeLog.txt
- projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt
- projects/browser/allowed_addons.json
- projects/browser/config
- projects/firefox-android/config
- projects/firefox/config
- projects/geckoview/config
- projects/go/config
- projects/manual/config
- projects/translation/config
- rbm.conf
- tools/fetch-manual.py
Changes:
=====================================
projects/browser/Bundle-Data/Docs-MB/ChangeLog.txt
=====================================
@@ -1,3 +1,58 @@
+Mullvad Browser 13.5a6 - March 28 2024
+ * All Platforms
+ * Updated Firefox to 115.9.0esr
+ * Updated mullvad-browser-extension to 0.9.0
+ * Bug 234: Make User-Agent request header match RFP's navigator.userAgent [mullvad-browser]
+ * Bug 271: After update, don't open the release page on Github. Instead link it in the startpage, like in Tor Browser [mullvad-browser]
+ * Bug 274: Rebase Mullvad Browser alpha onto Firefox 115.9.0esr [mullvad-browser]
+ * Bug 41676: Set privacy.resistFingerprinting.testing.setTZtoUTC as a defense-in-depth [tor-browser]
+ * Bug 41916: Letterboxing preferences UI [tor-browser]
+ * Bug 41918: Add option to reuse last window size when letterboxing is enabled [tor-browser]
+ * Bug 42211: Fluent migration: new identity [tor-browser]
+ * Bug 42214: Fluent migration: security level [tor-browser]
+ * Bug 42236: Let users decide whether to load their home page on new identity. [tor-browser]
+ * Bug 42428: Timezone offset leak via document.lastModified [tor-browser]
+ * Bug 42443: Shrink the window to match letterboxing size when the emtpy area is doble-clicked [tor-browser]
+ * Bug 42472: Timezone May leak from XSLT Date function [tor-browser]
+ * Bug 42473: ESR 115.9.1 fixes [tor-browser]
+ * Windows
+ * Bug 80: Make 'Mullvad your default browser' does not work on Windows [mullvad-browser]
+ * Bug 42377: Hidden fonts are automatically added to the allow list [tor-browser]
+ * Bug 41089: Add filetype association to the installer of Mullvad Browser [tor-browser-build]
+ * Linux
+ * Bug 42438: Adapt the data import wizard to use the original $HOME on Linux [tor-browser]
+ * Bug 41110: Avoid Fontconfig warning about "ambiguous path" [tor-browser-build]
+ * Build System
+ * All Platforms
+ * Bug 41088: Remove use of projects/browser/run_scripts [tor-browser-build]
+ * Bug 41102: src archive does not match likely due to mismatched xz-utils version [tor-browser-build]
+ * Bug 40073: We should remove ./ when using 7-zip for zip files [rbm]
+ * Windows
+ * Bug 41097: authenticode-timestamping.sh fails to run again because tmp-timestamp already exists [tor-browser-build]
+
+Mullvad Browser 13.0.13 - March 22 2024
+ * Windows + macOS + Linux
+ * Updated Firefox to 115.9.1esr
+ * Bug 42473: ESR 115.9.1 fixes [tor-browser]
+ * Bug 277: Rebase Mullvad Browser stable onto Firefox 115.9.1esr [mullvad-browser]
+
+Mullvad Browser 13.0.12 - March 19 2024
+ * All Platforms
+ * Updated Firefox to 115.9.0esr
+ * Updated mullvad-browser-extension to 0.9.0
+ * Updated uBlock Origin to 1.56.0
+ * Bug 270: Mullvad support email has changed from `support(a)mullvad.net` to `support(a)mullvadvpn.net` [mullvad-browser]
+ * Bug 273: Rebase Mullvad Browser stable onto Firefox 115.9.0esr [mullvad-browser]
+ * Bug 42376: The placeholder of datetime inputs keeps being localized when spoof English is on [tor-browser]
+ * Bug 42378: spoof english + htmlform <details> can leak app language [tor-browser]
+ * Windows
+ * Bug 42377: Hidden fonts are automatically added to the allow list [tor-browser]
+ * Build System
+ * All Platforms
+ * Bug 41085: kick_devmole_build script prints wrong URL for Mullvad's build hashes [tor-browser-build]
+ * Bug 41097: authenticode-timestamping.sh fails to run again because tmp-timestamp already exists [tor-browser-build]
+ * Bug 41102: src archive does not match likely due to mismatched xz-utils version [tor-browser-build]
+
Mullvad Browser 13.5a5 - February 27 2024
* All Platforms
* Updated Firefox to 115.8.0esr
=====================================
projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt
=====================================
@@ -1,3 +1,90 @@
+Tor Browser 13.5a6 - March 28 2024
+ * All Platforms
+ * Bug 41114: Fix no-async-promise-executor on TorConnect [tor-browser]
+ * Bug 41676: Set privacy.resistFingerprinting.testing.setTZtoUTC as a defense-in-depth [tor-browser]
+ * Bug 42336: Review the relationship between TorSettings and the TorProvider [tor-browser]
+ * Bug 42428: Timezone offset leak via document.lastModified [tor-browser]
+ * Bug 42435: Update moat domain fronting configuration [tor-browser]
+ * Bug 42437: Drop "torbrowser.version" preference [tor-browser]
+ * Bug 42444: Remove the "Prioritize .onion sites when known" option [tor-browser]
+ * Bug 42449: Rebase Tor Browser alpha onto Firefox 115.9.0esr [tor-browser]
+ * Bug 42459: Add startpage onion service to list of search providers [tor-browser]
+ * Bug 42466: Drop the "Onion Logo" from trademark statement [tor-browser]
+ * Bug 42472: Timezone May leak from XSLT Date function [tor-browser]
+ * Bug 42473: ESR 115.9.1 fixes [tor-browser]
+ * Bug 42481: Modularize SecurityLevel [tor-browser]
+ * Bug 41105: Bump version of snowflake to v2.9.2 [tor-browser-build]
+ * Windows + macOS + Linux
+ * Updated Firefox to 115.9.0esr
+ * Bug 41916: Letterboxing preferences UI [tor-browser]
+ * Bug 41918: Add option to reuse last window size when letterboxing is enabled [tor-browser]
+ * Bug 42203: Fluent migration: about dialog [tor-browser]
+ * Bug 42209: Fluent migration: tor circuit [tor-browser]
+ * Bug 42211: Fluent migration: new identity [tor-browser]
+ * Bug 42214: Fluent migration: security level [tor-browser]
+ * Bug 42236: Let users decide whether to load their home page on new identity. [tor-browser]
+ * Bug 42443: Shrink the window to match letterboxing size when the emtpy area is doble-clicked [tor-browser]
+ * Bug 42446: Improve accessible descriptions in built-in dialog [tor-browser]
+ * Bug 42458: Update the "Submit Feedback" link in "About Tor Browser" [tor-browser]
+ * Windows
+ * Bug 42377: Hidden fonts are automatically added to the allow list [tor-browser]
+ * Linux
+ * Bug 42438: Adapt the data import wizard to use the original $HOME on Linux [tor-browser]
+ * Bug 41110: Avoid Fontconfig warning about "ambiguous path" [tor-browser-build]
+ * Android
+ * Updated GeckoView to 115.9.0esr
+ * Bug 41187: Improve Android's bridge settings UI [tor-browser]
+ * Bug 42427: Do not ship bridges as prefences anymore [tor-browser]
+ * Build System
+ * All Platforms
+ * Updated Go to 1.21.8
+ * Bug 41102: src archive does not match likely due to mismatched xz-utils version [tor-browser-build]
+ * Bug 41107: Update download-unsigned-sha256sums-gpg-signatures-from-people-tpo for new type of URL [tor-browser-build]
+ * Bug 40073: We should remove ./ when using 7-zip for zip files [rbm]
+ * Windows + macOS + Linux
+ * Bug 42305: (Semi-)Automatically merge translation resources across tor browser releases (desktop) [tor-browser]
+ * Bug 41088: Remove use of projects/browser/run_scripts [tor-browser-build]
+ * Windows
+ * Bug 41097: authenticode-timestamping.sh fails to run again because tmp-timestamp already exists [tor-browser-build]
+ * Android
+ * Bug 40502: Do not recommend addons on Tor Browser [tor-browser]
+ * Bug 41082: Package tor expert bundle on android as .aar that firefox-android can use in lieu of tor-android-service with geckoview bootstrap [tor-browser-build]
+
+Tor Browser 13.0.13 - March 22 2024
+ * Windows + macOS + Linux
+ * Updated Firefox to 115.9.1esr
+ * Bug 42473: ESR 115.9.1 fixes [tor-browser]
+ * Bug 42474: Rebase stable browsers on 115.9.1 [tor-browser]
+
+Tor Browser 13.0.12 - March 19 2024
+ * All Platforms
+ * Updated Snowflake to 2.9.2
+ * Bug 42376: The placeholder of datetime inputs keeps being localized when spoof English is on [tor-browser]
+ * Bug 42378: spoof english + htmlform <details> can leak app language [tor-browser]
+ * Bug 42444: Remove the "Prioritize .onion sites when known" option [tor-browser]
+ * Bug 42448: Rebase Tor Browser stable onto Firefox 115.9.0esr [tor-browser]
+ * Bug 42459: Add startpage onion service to list of search providers [tor-browser]
+ * Bug 41105: Bump version of snowflake to v2.9.2 [tor-browser-build]
+ * Windows + macOS + Linux
+ * Updated Firefox to 115.9.0esr
+ * Windows
+ * Bug 42377: Hidden fonts are automatically added to the allow list [tor-browser]
+ * Android
+ * Updated GeckoView to 115.9.0esr
+ * Bug 42407: TTP-03-010 WP3: Potential phishing [tor-browser]
+ * Build System
+ * All Platforms
+ * Updated Go to 1.21.8
+ * Bug 41102: src archive does not match likely due to mismatched xz-utils version [tor-browser-build]
+
+Tor Browser 13.0.11 - March 06 2024
+ * All Platforms
+ * Bug 42435: Update moat domain fronting configuration [tor-browser]
+ * Build System
+ * All Platforms
+ * Bug 41085: kick_devmole_build script prints wrong URL for Mullvad's build hashes [tor-browser-build]
+ * Bug 41097: authenticode-timestamping.sh fails to run again because tmp-timestamp already exists [tor-browser-build]
+
Tor Browser 13.5a5 - February 28 2024
* All Platforms
* Updated OpenSSL to 3.0.13
=====================================
projects/browser/allowed_addons.json
=====================================
@@ -11,13 +11,13 @@
"authors": [
{
"id": 13299734,
- "name": "Alexander Shutau",
+ "name": "Dark Reader Ltd",
"url": "https://addons.mozilla.org/en-US/firefox/user/13299734/",
"username": "alexanderby",
- "picture_url": "https://addons.mozilla.org/user-media/userpics/34/9734/13299734/13299734.pn…"
+ "picture_url": "https://addons.mozilla.org/user-media/userpics/34/9734/13299734/13299734.pn…"
}
],
- "average_daily_users": 1137843,
+ "average_daily_users": 1157805,
"categories": {
"firefox": [
"web-development",
@@ -28,18 +28,18 @@
"contributions_url": "https://opencollective.com/darkreader?utm_content=product-page-contribute&u…",
"created": "2017-09-19T07:03:00Z",
"current_version": {
- "id": 5688757,
+ "id": 5705306,
"compatibility": {
"firefox": {
- "min": "54.0",
+ "min": "78.0",
"max": "*"
},
"android": {
- "min": "54.0",
+ "min": "113.0",
"max": "*"
}
},
- "edit_url": "https://addons.mozilla.org/en-US/developers/addon/darkreader/versions/56887…",
+ "edit_url": "https://addons.mozilla.org/en-US/developers/addon/darkreader/versions/57053…",
"is_strict_compatibility_enabled": false,
"license": {
"id": 22,
@@ -50,22 +50,22 @@
"url": "http://www.opensource.org/license/mit"
},
"release_notes": {
- "en-US": "- Fixed errors when Adopted Stylesheets were not present.\n- Fixed breaking on ::view-transition selectors (Airbnb issue).\n- Users' fixes for websites."
+ "en-US": "- Analyze inline background images for root elements.\n- Support for \"background\" attribute.\n- Fixed performance for asynchronously resolved inline styles.\n- Fixed freezes and incorrect work on several websites.\n- Dev Tools: Formatting of CSS fixes.\n- Users' fixes for websites."
},
- "reviewed": "2024-02-08T08:33:10Z",
- "version": "4.9.77",
+ "reviewed": "2024-03-18T08:14:15Z",
+ "version": "4.9.80",
"files": [
{
- "id": 4233074,
- "created": "2024-02-07T11:23:55Z",
- "hash": "sha256:931de67e9091c69edd9fd3f348a7ed1de1dce7d136017fed641bd10eb0ae8891",
+ "id": 4249607,
+ "created": "2024-03-13T17:13:44Z",
+ "hash": "sha256:a93f1250b72cc27fe4a9b02be062c68fb079e45a1233d562852b48e1e9b99307",
"is_restart_required": false,
"is_webextension": true,
"is_mozilla_signed_extension": false,
"platform": "all",
- "size": 725369,
+ "size": 731722,
"status": "public",
- "url": "https://addons.mozilla.org/firefox/downloads/file/4233074/darkreader-4.9.77…",
+ "url": "https://addons.mozilla.org/firefox/downloads/file/4249607/darkreader-4.9.80…",
"permissions": [
"alarms",
"contextMenus",
@@ -143,7 +143,7 @@
},
"is_disabled": false,
"is_experimental": false,
- "last_updated": "2024-02-08T08:33:10Z",
+ "last_updated": "2024-03-18T08:14:15Z",
"name": {
"ar": "Dark Reader",
"bn": "Dark Reader",
@@ -218,10 +218,10 @@
"category": "recommended"
},
"ratings": {
- "average": 4.5407,
- "bayesian_average": 4.539579140237365,
- "count": 5441,
- "text_count": 1716
+ "average": 4.5332,
+ "bayesian_average": 4.532093960246261,
+ "count": 5531,
+ "text_count": 1747
},
"ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/darkreader/reviews/",
"requires_payment": false,
@@ -318,7 +318,7 @@
"type": "extension",
"url": "https://addons.mozilla.org/en-US/firefox/addon/darkreader/",
"versions_url": "https://addons.mozilla.org/en-US/firefox/addon/darkreader/versions/",
- "weekly_downloads": 24267
+ "weekly_downloads": 23454
},
"notes": null
},
@@ -334,7 +334,7 @@
"picture_url": "https://addons.mozilla.org/user-media/userpics/56/7656/6937656/6937656.png?…"
}
],
- "average_daily_users": 264838,
+ "average_daily_users": 266335,
"categories": {
"firefox": [
"privacy-security"
@@ -547,10 +547,10 @@
"category": "recommended"
},
"ratings": {
- "average": 4.8001,
- "bayesian_average": 4.795468550922711,
- "count": 1406,
- "text_count": 252
+ "average": 4.7986,
+ "bayesian_average": 4.793974484524402,
+ "count": 1415,
+ "text_count": 255
},
"ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/reviews/",
"requires_payment": false,
@@ -635,7 +635,7 @@
"type": "extension",
"url": "https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/",
"versions_url": "https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/versions/",
- "weekly_downloads": 3215
+ "weekly_downloads": 3292
},
"notes": null
},
@@ -651,7 +651,7 @@
"picture_url": "https://addons.mozilla.org/user-media/userpics/73/4073/5474073/5474073.png?…"
}
],
- "average_daily_users": 1223061,
+ "average_daily_users": 1231658,
"categories": {
"firefox": [
"privacy-security"
@@ -1170,10 +1170,10 @@
"category": "recommended"
},
"ratings": {
- "average": 4.7952,
- "bayesian_average": 4.7924799598835,
- "count": 2393,
- "text_count": 455
+ "average": 4.7988,
+ "bayesian_average": 4.796088382620796,
+ "count": 2415,
+ "text_count": 458
},
"ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/privacy-badger17/reviews/",
"requires_payment": false,
@@ -1197,7 +1197,7 @@
"type": "extension",
"url": "https://addons.mozilla.org/en-US/firefox/addon/privacy-badger17/",
"versions_url": "https://addons.mozilla.org/en-US/firefox/addon/privacy-badger17/versions/",
- "weekly_downloads": 21906
+ "weekly_downloads": 22533
},
"notes": null
},
@@ -1213,7 +1213,7 @@
"picture_url": null
}
],
- "average_daily_users": 7691950,
+ "average_daily_users": 7819848,
"categories": {
"firefox": [
"privacy-security"
@@ -1379,7 +1379,7 @@
},
"is_disabled": false,
"is_experimental": false,
- "last_updated": "2024-02-20T18:51:52Z",
+ "last_updated": "2024-03-26T17:25:30Z",
"name": {
"ar": "uBlock Origin",
"bg": "uBlock Origin",
@@ -1524,10 +1524,10 @@
"category": "recommended"
},
"ratings": {
- "average": 4.7887,
- "bayesian_average": 4.788323774199536,
- "count": 17283,
- "text_count": 4511
+ "average": 4.7892,
+ "bayesian_average": 4.788825346990968,
+ "count": 17455,
+ "text_count": 4552
},
"ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/reviews/",
"requires_payment": false,
@@ -1590,7 +1590,7 @@
"type": "extension",
"url": "https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/",
"versions_url": "https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/versions/",
- "weekly_downloads": 170114
+ "weekly_downloads": 158166
},
"notes": null
},
@@ -1606,7 +1606,7 @@
"picture_url": null
}
],
- "average_daily_users": 177359,
+ "average_daily_users": 178562,
"categories": {
"firefox": [
"photos-music-videos",
@@ -1702,10 +1702,10 @@
"category": "recommended"
},
"ratings": {
- "average": 4.4571,
- "bayesian_average": 4.452141766560867,
- "count": 1201,
- "text_count": 460
+ "average": 4.4481,
+ "bayesian_average": 4.443180454772495,
+ "count": 1214,
+ "text_count": 467
},
"ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/video-background-play-fix/re…",
"requires_payment": false,
@@ -1727,7 +1727,7 @@
"type": "extension",
"url": "https://addons.mozilla.org/en-US/firefox/addon/video-background-play-fix/",
"versions_url": "https://addons.mozilla.org/en-US/firefox/addon/video-background-play-fix/ve…",
- "weekly_downloads": 466
+ "weekly_downloads": 386
},
"notes": null
},
@@ -1743,7 +1743,7 @@
"picture_url": null
}
],
- "average_daily_users": 79283,
+ "average_daily_users": 77166,
"categories": {
"firefox": [
"privacy-security",
@@ -1853,10 +1853,10 @@
],
"promoted": null,
"ratings": {
- "average": 4.3787,
- "bayesian_average": 4.364570736907983,
- "count": 404,
- "text_count": 113
+ "average": 4.3753,
+ "bayesian_average": 4.3611016639271964,
+ "count": 405,
+ "text_count": 114
},
"ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/privacy-possum/reviews/",
"requires_payment": false,
@@ -1878,7 +1878,7 @@
"type": "extension",
"url": "https://addons.mozilla.org/en-US/firefox/addon/privacy-possum/",
"versions_url": "https://addons.mozilla.org/en-US/firefox/addon/privacy-possum/versions/",
- "weekly_downloads": 1367
+ "weekly_downloads": 1963
},
"notes": null
},
@@ -1894,7 +1894,7 @@
"picture_url": "https://addons.mozilla.org/user-media/userpics/64/9064/12929064/12929064.pn…"
}
],
- "average_daily_users": 302489,
+ "average_daily_users": 309800,
"categories": {
"firefox": [
"search-tools",
@@ -2111,10 +2111,10 @@
"category": "recommended"
},
"ratings": {
- "average": 4.6464,
- "bayesian_average": 4.641961457940663,
- "count": 1411,
- "text_count": 273
+ "average": 4.6336,
+ "bayesian_average": 4.629244598584173,
+ "count": 1441,
+ "text_count": 284
},
"ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/search_by_image/reviews/",
"requires_payment": false,
@@ -2137,7 +2137,7 @@
"type": "extension",
"url": "https://addons.mozilla.org/en-US/firefox/addon/search_by_image/",
"versions_url": "https://addons.mozilla.org/en-US/firefox/addon/search_by_image/versions/",
- "weekly_downloads": 5867
+ "weekly_downloads": 5510
},
"notes": null
},
@@ -2160,7 +2160,7 @@
"picture_url": null
}
],
- "average_daily_users": 124312,
+ "average_daily_users": 124783,
"categories": {
"firefox": [
"search-tools",
@@ -2441,10 +2441,10 @@
"category": "recommended"
},
"ratings": {
- "average": 4.3717,
- "bayesian_average": 4.36732284678191,
- "count": 1329,
- "text_count": 376
+ "average": 4.3766,
+ "bayesian_average": 4.372232748328777,
+ "count": 1341,
+ "text_count": 379
},
"ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/google-search-fixer/reviews/",
"requires_payment": false,
@@ -2464,7 +2464,7 @@
"type": "extension",
"url": "https://addons.mozilla.org/en-US/firefox/addon/google-search-fixer/",
"versions_url": "https://addons.mozilla.org/en-US/firefox/addon/google-search-fixer/versions/",
- "weekly_downloads": 37
+ "weekly_downloads": 26
},
"notes": null
},
@@ -2480,12 +2480,11 @@
"picture_url": "https://addons.mozilla.org/user-media/userpics/43/0143/143/143.png?modified…"
}
],
- "average_daily_users": 308206,
+ "average_daily_users": 307654,
"categories": {
"firefox": [
- "web-development",
"privacy-security",
- "other"
+ "alerts-updates"
]
},
"contributions_url": "https://www.paypal.com/donate/?hosted_button_id=9ERKTU5MBH4EW&utm_content=p…",
@@ -2550,20 +2549,20 @@
"default_locale": "en-US",
"description": {
"da": "Dette værktøj, vinder af \"2006 PC World World Class Award\", giver ekstra beskyttelse til din Firefox.\nDen lader kun JavaScript, Java og andet kørbart indhold køre fra betroede domæner du har valgt, fx din home-banking hjemmeside, og forsvarer \"tillids-grænserne\" mod cross-site scripting angreb (XXS).\nEn sådan forebyggende metode forhindrer udnyttelse af sikkerhedshuller (kendte som ukendte!) uden tab af funktionalitet...\nEksperterne er enige: Firefox er faktisk mere sikker med NoScript ;-)",
- "de": "<b>WICHTIG</b>\n<a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e19d2306e457c98e6c3e03…" rel=\"nofollow\">Eine Anleitung in die Grundlagen von <b>NoScript 10</b></a>\n\nIst die neue Oberfläche von NoScript 10 immer noch ungewohnt?\nSehen Sie sich diese <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/f5ad7f79289d1b2c198593…" rel=\"nofollow\">von Nutzern erstellte NoScript 10 Einführung</a> und diesen <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/4e700d4e76086494b5553f…" rel=\"nofollow\">Vergleich zwischen NoScript 10 \"Quantum\" und NoScript 5 \"Classic\"</a> an.\n\nAls Gewinner des \"PC World World Class Award\" und ausgeliefert als Teil des Tor Browsers bietet Ihnen NoScript den besten verfügbaren Schutz im Internet.\n\nMit NoScript können Sie JavaScript, Flash, Java und andere ausführbare Inhalte bloß auf vertrauenswürdigen Domains Ihrer Wahl zulassen, z.B. beim Online-Banking. Somit verhindern Sie aus der Ferne ausnutzbare Schwachstellen inklusive Spectre und Meltdown.\n\nIhre vertrauenswürdigen Bereiche werden dank der einmaligen ClearClick Technologie gegen seitenübergreifende Scripting-Attacken (XSS), Cross-Zone DNS Rebinding / CSRF Attacken (Router Hacking), und Clickjacking-Versuche geschützt.\n\nDieser präventive Ansatz verhindert das Ausnutzen von (bekannten und unbekannten!) Sicherheitslücken ohne Verlust an Funktionalität, wo Sie diese benötigen.\nExperten sind sich einig: Firefox wird wirklich noch sicherer mithilfe von NoScript ;-)\n\n\nFAQ: <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a4a623eb90a9becd02eed…" rel=\"nofollow\">https://noscript.net/faq</a>\nForum: <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a6b9e607349db8d83719e…" rel=\"nofollow\">https://noscript.net/forum</a>",
+ "de": "<b>WICHTIG</b>\n<a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e19d2306e457c98e6c3e03…">Eine Anleitung in die Grundlagen von <b>NoScript 10</b></a>\n\nIst die neue Oberfläche von NoScript 10 immer noch ungewohnt?\nSehen Sie sich diese <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/f5ad7f79289d1b2c198593…">von Nutzern erstellte NoScript 10 Einführung</a> und diesen <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/4e700d4e76086494b5553f…">Vergleich zwischen NoScript 10 \"Quantum\" und NoScript 5 \"Classic\"</a> an.\n\nAls Gewinner des \"PC World World Class Award\" und ausgeliefert als Teil des Tor Browsers bietet Ihnen NoScript den besten verfügbaren Schutz im Internet.\n\nMit NoScript können Sie JavaScript, Flash, Java und andere ausführbare Inhalte bloß auf vertrauenswürdigen Domains Ihrer Wahl zulassen, z.B. beim Online-Banking. Somit verhindern Sie aus der Ferne ausnutzbare Schwachstellen inklusive Spectre und Meltdown.\n\nIhre vertrauenswürdigen Bereiche werden dank der einmaligen ClearClick Technologie gegen seitenübergreifende Scripting-Attacken (XSS), Cross-Zone DNS Rebinding / CSRF Attacken (Router Hacking), und Clickjacking-Versuche geschützt.\n\nDieser präventive Ansatz verhindert das Ausnutzen von (bekannten und unbekannten!) Sicherheitslücken ohne Verlust an Funktionalität, wo Sie diese benötigen.\nExperten sind sich einig: Firefox wird wirklich noch sicherer mithilfe von NoScript ;-)\n\n\nFAQ: <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a4a623eb90a9becd02eed…">https://noscript.net/faq</a>\nForum: <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a6b9e607349db8d83719e…">https://noscript.net/forum</a>",
"el": "Αυτό το πρόσθετο που κέρδισε το βραβείο «2006 World Class Award» του περιοδικού PC World, παρέχει πρόσθετη προστασία στον Firefox.\nΕπιτρέπει την εκτέλεση JavaScript, Java και άλλου εκτελέσιμου περιεχομένου, μόνο για έμπιστους τομείς δικτύου της επιλογής σας (π.χ. την δικτυακή υπηρεσία τραπεζικών συναλλαγών σας) και τους προστατεύει από τον κίνδυνο επιθέσεων cross-site scripting (XSS) .\nΑυτή η προσέγγιση προκαταβολικού μπλοκαρίσματος δεν επιτρέπει την εκμετάλλευση κενών ασφαλείας (ήδη γνωστών αλλά και άγνωστων ακόμα!) χωρίς να επηρεάζει την λειτουργικότητα...\nΟι ειδικοί συμφωνούν: Ο Firefox είναι πραγματικά ασφαλέστερος με το NoScript! ;-)",
- "en-US": "Winner of the \"PC World - World Class Award\" and bundled with the Tor Browser, NoScript gives you the best available protection on the web. It allows JavaScript, Flash, and other executable content to run only from trusted domains of your choice (e.g. your banking site), thus mitigating remotely exploitable vulnerabilities, such as Spectre and Meltdown.\n\nIt protects your \"trust boundaries\" against cross-site scripting attacks (XSS), cross-zone DNS rebinding / CSRF attacks (router hacking), and Clickjacking attempts, thanks to its unique ClearClick technology.\n\nSuch a preemptive approach prevents exploitation of security vulnerabilities (known and unknown!) with no loss of functionality where you need it. Experts do agree: Firefox is really safer with NoScript ;-)\n\nFAQ: <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a4a623eb90a9becd02eed…" rel=\"nofollow\">https://noscript.net/faq</a>\nForum: <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a6b9e607349db8d83719e…" rel=\"nofollow\">https://noscript.net/forum</a>\n\n<a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e19d2306e457c98e6c3e03…" rel=\"nofollow\">A Basic <b>NoScript 10 Guide</b></a>\n\nStill confused by NoScript 10's new UI?\nCheck this <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/f5ad7f79289d1b2c198593…" rel=\"nofollow\">user-contributed NoScript 10 primer</a>.\nand this <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/4e700d4e76086494b5553f…" rel=\"nofollow\">NoScript 10 \"Quantum\" vs NoScript 5 \"Classic\" (or \"Legacy\") comparison</a>.",
+ "en-US": "Winner of the \"PC World - World Class Award\" and bundled with the Tor Browser, NoScript gives you the best available protection on the web. It allows JavaScript, Flash, and other executable content to run only from trusted domains of your choice (e.g. your banking site), thus mitigating remotely exploitable vulnerabilities, such as Spectre and Meltdown.\n\nIt protects your \"trust boundaries\" against cross-site scripting attacks (XSS), cross-zone DNS rebinding / CSRF attacks (router hacking), and Clickjacking attempts, thanks to its unique ClearClick technology.\n\nSuch a preemptive approach prevents exploitation of security vulnerabilities (known and unknown!) with no loss of functionality where you need it. \nExperts do agree: Firefox is really safer with NoScript!\n\nFAQ: <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a4a623eb90a9becd02eed…" rel=\"nofollow\">https://noscript.net/faq</a>\nForum: <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a6b9e607349db8d83719e…" rel=\"nofollow\">https://noscript.net/forum</a>\n\n<a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e19d2306e457c98e6c3e03…" rel=\"nofollow\">A Basic <b>NoScript 10 Guide</b></a>\n\nStill confused by NoScript 10's new UI?\nCheck this <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/f5ad7f79289d1b2c198593…" rel=\"nofollow\">user-contributed NoScript 10 primer</a>.\nand this <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/4e700d4e76086494b5553f…" rel=\"nofollow\">NoScript 10 \"Quantum\" vs NoScript 5 \"Classic\" (or \"Legacy\") comparison</a>.",
"es": "Protección extra para su Firefox: NoScript sólo permite JavaScript, Java y otros plugins en los sitios web de confianza que Ud. elija (como la web de su banco). Este planteamiento preventivo basado en una lista blanca evita que se puedan explotar vulnerabilidades (conocidas o incluso desconocidas) sin pérdida de funcionalidad... Los expertos lo confirmarán: Firefox es realmente más seguro con NoScript :-)",
- "fr": "<b>IMPORTANT</b>\n<a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e19d2306e457c98e6c3e03…" rel=\"nofollow\">Un Guide élémentaire pour <b>NoScript 10</b> (en anglais)</a>\n\nConfus avec la nouvelle interface graphique de NoScript 10 ?\nConsultez cette <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/f5ad7f79289d1b2c198593…" rel=\"nofollow\">introduction à NoScript 10, contribution d’un utilisateur</a> (en anglais)\net cette <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/4e700d4e76086494b5553f…" rel=\"nofollow\">comparaison entre NoScript 10 « Quantum » et NoScript 5 « Classic » (ou « Legacy »)</a> (en anglais).\n\nLauréat du « World Class Award » décerné par PC World et fourni avec le navigateur Tor, NoScript vous offre la meilleure protection disponible pour le Web.\n\nIl autorise le contenu actif JavaScript, Flash, Java et autres à ne s’exécuter que sur les domaines de confiance de votre choix, par exemple le site de votre banque, réduisant le risque d’exploitation à distance de vulnérabilités comme Spectre et Meltdown.\n\nIl protège vos zones de confiance contre les attaques par cross-site scripting (XSS), DNS rebinding / attaque CSRF (Cross Site Request Forgery) (piratage de routeur) et les tentatives de détournement de clic (Clickjacking) grâce à sa propre technologie ClearClick.\n\nCette approche préventive empêche l’exploitation des failles de sécurité (connues mais aussi inconnues) sans perte de fonctionnalités là où vous en avez besoin. Les experts en conviendront : Firefox est réellement plus sûr avec NoScript ;-)\n\nFAQ : <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a4a623eb90a9becd02eed…" rel=\"nofollow\">https://noscript.net/faq</a> (en anglais)\nForum : <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a6b9e607349db8d83719e…" rel=\"nofollow\">https://noscript.net/forum</a> (en anglais)",
- "it": "<b>IMPORTANTE</b>\n<a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e19d2306e457c98e6c3e03…" rel=\"nofollow\">Guida di base a <b>NoScript 10</b></a>\n\nAncora confuso dalla nuova interfaccia di NoScript 10?\nLeggi qui <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/f5ad7f79289d1b2c198593…" rel=\"nofollow\">i contributi degli utenti di NoScript 10</a>.\ne <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/4e700d4e76086494b5553f…" rel=\"nofollow\"> una comparazione tra NoScript 10 \"Quantum\" vs NoScript 5 \"Classic\" (o \"Legacy\")</a>.\n\nVincitore del premio \"PC World World Class Award\" ed incorporato nel browser Tor, NoScript ti offre la migliore protezione possibile per il web.\n\nAttiva JavaScript, Flash, Java e altri eseguibili solo sui domini fidati scelti da te, ad esempio il sito della tua banca, riducendo le possibili conseguenze di vulnerabilità, inclusi Spectre e Meltdown.\n\nProtegge la tua rete dagli attacchi cross-site scripting (XSS), cross-zone DNS rebinding / attacchi CSRF (intrusione nel router) e tentativi di Clickjacking, grazie alla sua tecnologia unica ClearClick. \n\nCon un approccio proattivo previene lo sfruttamento di vulnerabilità di sicurezza (conosciute e ancora sconosciute!) senza perdere le funzionalità necessarie.\nGli esperti sono d'accordo: Firefox è veramente più sicuro con NoScript ;-)\n\nFAQ: <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a4a623eb90a9becd02eed…" rel=\"nofollow\">https://noscript.net/faq</a>\nForum: <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a6b9e607349db8d83719e…" rel=\"nofollow\">https://noscript.net/forum</a>",
- "nl": "<b>BELANGRIJK</b>\n<a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e19d2306e457c98e6c3e03…" rel=\"nofollow\">Een basale <b>Handleiding voor NoScript 10</b></a>\n\nNog steeds in verwarring door de nieuwe UI van NoScript 10?\nBekijk deze <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/f5ad7f79289d1b2c198593…" rel=\"nofollow\">door gebruikers aangeleverde beknopte handleiding voor NoScript 10</a>\nen deze <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/4e700d4e76086494b5553f…" rel=\"nofollow\">vergelijking tussen NoScript 10 ‘Quantum’ en NoScript 5 ‘Classic’ (of ‘Verouderd’)</a>.\n\nAls winnaar van de ‘PC World World Class Award’ en gebundeld met de Tor-browser biedt NoScript de best beschikbare bescherming op het web.\n\nHet zorgt ervoor dat JavaScript, Flash, Java en andere uitvoerbare inhoud alleen wordt uitgevoerd vanaf vertrouwde domeinen van uw keuze, zoals uw website voor thuisbankieren, zodat op afstand te misbruiken kwetsbaarheden, waaronder Spectre en Meltdown, worden verminderd.\n\nHet beschermt uw ‘vertrouwensgrenzen’ tegen cross-site-scripting-aanvallen (XSS), cross-zone-DNS-rebinding / CSRF-aanvallen (routerhacking) en Clickjacking-pogingen, dankzij de unieke ClearClick-technologie ervan. \n\nEen dergelijke preventieve benadering voorkomt exploitatie van beveiligingskwetsbaarheden (bekende en zelfs onbekende!) zonder verlies van functionaliteit waar dat nodig is.\nExperts zijn het ermee eens: Firefox is echt veiliger met NoScript ;-)\n\nFAQ: <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a4a623eb90a9becd02eed…" rel=\"nofollow\">https://noscript.net/faq</a>\nForum: <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a6b9e607349db8d83719e…" rel=\"nofollow\">https://noscript.net/forum</a>",
+ "fr": "<b>IMPORTANT</b>\n<a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e19d2306e457c98e6c3e03…">Un Guide élémentaire pour <b>NoScript 10</b> (en anglais)</a>\n\nConfus avec la nouvelle interface graphique de NoScript 10 ?\nConsultez cette <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/f5ad7f79289d1b2c198593…">introduction à NoScript 10, contribution d’un utilisateur</a> (en anglais)\net cette <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/4e700d4e76086494b5553f…">comparaison entre NoScript 10 « Quantum » et NoScript 5 « Classic » (ou « Legacy »)</a> (en anglais).\n\nLauréat du « World Class Award » décerné par PC World et fourni avec le navigateur Tor, NoScript vous offre la meilleure protection disponible pour le Web.\n\nIl autorise le contenu actif JavaScript, Flash, Java et autres à ne s’exécuter que sur les domaines de confiance de votre choix, par exemple le site de votre banque, réduisant le risque d’exploitation à distance de vulnérabilités comme Spectre et Meltdown.\n\nIl protège vos zones de confiance contre les attaques par cross-site scripting (XSS), DNS rebinding / attaque CSRF (Cross Site Request Forgery) (piratage de routeur) et les tentatives de détournement de clic (Clickjacking) grâce à sa propre technologie ClearClick.\n\nCette approche préventive empêche l’exploitation des failles de sécurité (connues mais aussi inconnues) sans perte de fonctionnalités là où vous en avez besoin. Les experts en conviendront : Firefox est réellement plus sûr avec NoScript ;-)\n\nFAQ : <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a4a623eb90a9becd02eed…">https://noscript.net/faq</a> (en anglais)\nForum : <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a6b9e607349db8d83719e…">https://noscript.net/forum</a> (en anglais)",
+ "it": "<b>IMPORTANTE</b>\n<a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e19d2306e457c98e6c3e03…">Guida di base a <b>NoScript 10</b></a>\n\nAncora confuso dalla nuova interfaccia di NoScript 10?\nLeggi qui <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/f5ad7f79289d1b2c198593…">i contributi degli utenti di NoScript 10</a>.\ne <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/4e700d4e76086494b5553f…"> una comparazione tra NoScript 10 \"Quantum\" vs NoScript 5 \"Classic\" (o \"Legacy\")</a>.\n\nVincitore del premio \"PC World World Class Award\" ed incorporato nel browser Tor, NoScript ti offre la migliore protezione possibile per il web.\n\nAttiva JavaScript, Flash, Java e altri eseguibili solo sui domini fidati scelti da te, ad esempio il sito della tua banca, riducendo le possibili conseguenze di vulnerabilità, inclusi Spectre e Meltdown.\n\nProtegge la tua rete dagli attacchi cross-site scripting (XSS), cross-zone DNS rebinding / attacchi CSRF (intrusione nel router) e tentativi di Clickjacking, grazie alla sua tecnologia unica ClearClick. \n\nCon un approccio proattivo previene lo sfruttamento di vulnerabilità di sicurezza (conosciute e ancora sconosciute!) senza perdere le funzionalità necessarie.\nGli esperti sono d'accordo: Firefox è veramente più sicuro con NoScript ;-)\n\nFAQ: <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a4a623eb90a9becd02eed…">https://noscript.net/faq</a>\nForum: <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a6b9e607349db8d83719e…">https://noscript.net/forum</a>",
+ "nl": "<b>BELANGRIJK</b>\n<a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e19d2306e457c98e6c3e03…">Een basale <b>Handleiding voor NoScript 10</b></a>\n\nNog steeds in verwarring door de nieuwe UI van NoScript 10?\nBekijk deze <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/f5ad7f79289d1b2c198593…">door gebruikers aangeleverde beknopte handleiding voor NoScript 10</a>\nen deze <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/4e700d4e76086494b5553f…">vergelijking tussen NoScript 10 ‘Quantum’ en NoScript 5 ‘Classic’ (of ‘Verouderd’)</a>.\n\nAls winnaar van de ‘PC World World Class Award’ en gebundeld met de Tor-browser biedt NoScript de best beschikbare bescherming op het web.\n\nHet zorgt ervoor dat JavaScript, Flash, Java en andere uitvoerbare inhoud alleen wordt uitgevoerd vanaf vertrouwde domeinen van uw keuze, zoals uw website voor thuisbankieren, zodat op afstand te misbruiken kwetsbaarheden, waaronder Spectre en Meltdown, worden verminderd.\n\nHet beschermt uw ‘vertrouwensgrenzen’ tegen cross-site-scripting-aanvallen (XSS), cross-zone-DNS-rebinding / CSRF-aanvallen (routerhacking) en Clickjacking-pogingen, dankzij de unieke ClearClick-technologie ervan. \n\nEen dergelijke preventieve benadering voorkomt exploitatie van beveiligingskwetsbaarheden (bekende en zelfs onbekende!) zonder verlies van functionaliteit waar dat nodig is.\nExperts zijn het ermee eens: Firefox is echt veiliger met NoScript ;-)\n\nFAQ: <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a4a623eb90a9becd02eed…">https://noscript.net/faq</a>\nForum: <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a6b9e607349db8d83719e…">https://noscript.net/forum</a>",
"pl": "Zwycięzca \"2006 PC World World Class Award\". Narzędzie to stanowi dodatkowe\nzabezpieczenie dla wszystkich przeglądarek Mozilli. NoScript pozwala\nwykonywać skrypty JavaScript i aplety Java tylko przez zaufane domeny\nwybrane przez użytkownika np. witryny banków internetowych oraz zabezpiecza\nprzed atakami typu \"cross-site scripting\" (XSS). Takie prewencyjne podejście\nzabezpiecza przed wykorzystaniem luk bezpieczeństwa - znanych i nieznanych -\nbez utraty funkcjonalności.\n\nEksperci są zgodni: Firefox z NoScript jest naprawdę bezpieczniejszy!",
- "pt-BR": "IMPORTANTE\n<a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e19d2306e457c98e6c3e03…" rel=\"nofollow\">Um <b>guia básico do NoScript 10</b></a>\n\nAinda confuso com a nova interface gráfica do NoScript 10?\nConsulte esta <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/f5ad7f79289d1b2c198593…" rel=\"nofollow\">cartilha do NoScript 10 de contribuições de usuários</a>.\ne esta <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/4e700d4e76086494b5553f…" rel=\"nofollow\">comparação entre NoScript 10 \"Quantum\" e NoScript 5 \"Classic\" (ou \"Legado\")</a>.\n\nVencedor do \"PC World World Class Award\" e incorporado ao Navegador Tor, o NoScript lhe oferece a melhor proteção disponível na web.\n\nEle permite que JavaScript, Flash, Java e outros conteúdos executáveis funcionem apenas em domínios de sua confiança, por exemplo no site do seu banco, mitigando vulnerabilidades de exploração remota, incluindo Spectre e Meltdown.\n\nProtege suas \"fronteiras seguras\" contra ataques 'cross-site scripting' (XSS), ataques 'cross-zone DNS rebinding / CSRF' (invasão de roteador) e tentativas de Clickjacking, graças à sua inigualável tecnologia ClearClick. \n\nTal abordagem preemptiva previne exploração de vulnerabilidades de segurança (conhecidas e até mesmo desconhecidas!) sem perda de funcionalidade onde você precisa.\nEspecialistas concordam: o Firefox é realmente mais seguro com o NoScript ;-)\n\nFAQ: <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a4a623eb90a9becd02eed…" rel=\"nofollow\">https://noscript.net/faq</a>\nFórum: <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a6b9e607349db8d83719e…" rel=\"nofollow\">https://noscript.net/forum</a>",
+ "pt-BR": "IMPORTANTE\n<a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e19d2306e457c98e6c3e03…">Um <b>guia básico do NoScript 10</b></a>\n\nAinda confuso com a nova interface gráfica do NoScript 10?\nConsulte esta <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/f5ad7f79289d1b2c198593…">cartilha do NoScript 10 de contribuições de usuários</a>.\ne esta <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/4e700d4e76086494b5553f…">comparação entre NoScript 10 \"Quantum\" e NoScript 5 \"Classic\" (ou \"Legado\")</a>.\n\nVencedor do \"PC World World Class Award\" e incorporado ao Navegador Tor, o NoScript lhe oferece a melhor proteção disponível na web.\n\nEle permite que JavaScript, Flash, Java e outros conteúdos executáveis funcionem apenas em domínios de sua confiança, por exemplo no site do seu banco, mitigando vulnerabilidades de exploração remota, incluindo Spectre e Meltdown.\n\nProtege suas \"fronteiras seguras\" contra ataques 'cross-site scripting' (XSS), ataques 'cross-zone DNS rebinding / CSRF' (invasão de roteador) e tentativas de Clickjacking, graças à sua inigualável tecnologia ClearClick. \n\nTal abordagem preemptiva previne exploração de vulnerabilidades de segurança (conhecidas e até mesmo desconhecidas!) sem perda de funcionalidade onde você precisa.\nEspecialistas concordam: o Firefox é realmente mais seguro com o NoScript ;-)\n\nFAQ: <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a4a623eb90a9becd02eed…">https://noscript.net/faq</a>\nFórum: <a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a6b9e607349db8d83719e…">https://noscript.net/forum</a>",
"ru": "Победитель \"2006 PC World World Class Award», этот инструмент обеспечивает дополнительную защиту для Вашего Firefox.\nОно позволяет запуск JavaScript, Java и другого активного содержимого только для доверенных доменов по Вашему выбору, например, Ваш личный банковский веб-сайт. Обеспечивает безопасность Вашей работы в \"зоне доверия\", защищает от атак с использованием межузловых сценариев (XSS), кросс-зоны DNS подменой / CSRF-атак (хакерских маршрутизаторов), и атаки ClickJacking, благодаря своей уникальной технологии ClearClick. Он также реализует DoNotTrack защиту по умолчанию, см. <a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/bd4266094d321e473190ea…" rel=\"nofollow\">http://snipurl.com/nsdntrack</a>.\nТакой упреждающий подход предотвращает использование уязвимостей (известных и даже неизвестных!) Без потери функциональности.\nЭксперты едины во мнении: Firefox действительно безопаснее с NoScript ;-)",
"sk": "Víťaz ceny \"2006 PC World World Class Award\". Tento nástroj poskytuje špeciálnu ochranu Firefoxu.\nPovoľuje spúšťanie JavaScriptu, Javy a ďalšieho spustiteľného obsahu len na dôveryhodných doménach podľa vášho výberu, napr. na webovej stránke bankingu.\nTakýto preventívny prístup chráni pred zneužitím bezpečnostných dier (známych aj neznámych) bez straty funkčnosti.\nOdborníci by súhlasili: Firefox je s rozšírením NoScript naozaj bezpečnejší ;-)",
"vi": "Đã chiến thắng trong \"Giải thưởng Cấp độ Thế giới PC World 2006\", công cụ này cung cấp lớp phòng vệ phụ thêm cho Firefox của bạn.\nNoScript chỉ cho phép JavaScript, Java (và các phần bổ trợ khác) trên những tên miền tin cậy mà bạn chọn (vd., trang web ngân hàng của bạn), canh gác \"vùng biên giới tin cậy\" của bạn chống lại các âm mưu tấn công cross-site scripting (XSS) và Clickjacking, nhờ công nghệ ClearClick của nó.\nPhương thức ngăn chặn trước dựa trên sổ trắng này ngăn chặn việc khai thác các lỗ hổng bảo mật (đã biết hay thậm chí chưa biết!) mà không làm mất đi chức năng...\nCác chuyên gia đều đồng ý rằng: Firefox thật sự an toàn hơn với NoScript :-)",
"zh-TW": "這個工具是 2006 PC World 世界級大獎贏家,讓你的 Firefox 更加安全!\n\n使用此套件後,僅有你信任的網站(例如你的銀行)才能執行腳本、Java 與其他動態內容。建立「信任範圍」以抵擋跨網站腳本攻擊(XSS)。\n\n未雨綢繆、使用此套件避開安全漏洞(連未知的漏洞也照擋不誤),而不損失正常功能…\n\n連專家都同意、Firefox 有了 NoScript 後更加安全了 ;-)",
- "zh-CN": "重要\n<a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e19d2306e457c98e6c3e03…" rel=\"nofollow\">一篇基础的<b>NoScript 10 指南</b></a>\n\n仍被 NoScript 10 的新 UI 所困惑?\n看看这篇<a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/f5ad7f79289d1b2c198593…" rel=\"nofollow\">用户贡献的 NoScript 10 入门</a>。\n还有这篇<a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/4e700d4e76086494b5553f…" rel=\"nofollow\"> NoScript 10 \"Quantum\" vs NoScript 5 \"Classic\" (or \"Legacy\") comparison</a>。\n\n作为“PC World World Class Award”大奖的获得者并内置于 Tor 浏览器,NoScript 将为您提供最佳的网络保护。\n\n它只允许在您选择的信任域上执行 JavaScript、Flash、Java 和其他可执行内容,例如您的家庭银行网站,能够缓解包括 Spectre 和 Meltdown 等远程可利用漏洞。\n\n多亏了其独特的 ClearClick 技术,它可以保护您的“信任边界”不受跨站点脚本攻击(XSS),跨区 DNS 重新绑定/ CSRF 攻击(路由器黑客)和点击劫持(Clickjacking)尝试。\n\n这种先发制人的机制在不损失任何功能的前提下,防止利用安全漏洞(已知甚至未知的!)进行攻击。\n专家们一致同意:拥有 NoScript 的 Firefox 更安全 :-)\n\n常见问题解答:<a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a4a623eb90a9becd02eed…" rel=\"nofollow\">https://noscript.net/faq</a>\n论坛:<a href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a6b9e607349db8d83719e…" rel=\"nofollow\">https://noscript.net/forum</a>"
+ "zh-CN": "重要\n<a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/e19d2306e457c98e6c3e03…">一篇基础的<b>NoScript 10 指南</b></a>\n\n仍被 NoScript 10 的新 UI 所困惑?\n看看这篇<a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/f5ad7f79289d1b2c198593…">用户贡献的 NoScript 10 入门</a>。\n还有这篇<a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/4e700d4e76086494b5553f…"> NoScript 10 \"Quantum\" vs NoScript 5 \"Classic\" (or \"Legacy\") comparison</a>。\n\n作为“PC World World Class Award”大奖的获得者并内置于 Tor 浏览器,NoScript 将为您提供最佳的网络保护。\n\n它只允许在您选择的信任域上执行 JavaScript、Flash、Java 和其他可执行内容,例如您的家庭银行网站,能够缓解包括 Spectre 和 Meltdown 等远程可利用漏洞。\n\n多亏了其独特的 ClearClick 技术,它可以保护您的“信任边界”不受跨站点脚本攻击(XSS),跨区 DNS 重新绑定/ CSRF 攻击(路由器黑客)和点击劫持(Clickjacking)尝试。\n\n这种先发制人的机制在不损失任何功能的前提下,防止利用安全漏洞(已知甚至未知的!)进行攻击。\n专家们一致同意:拥有 NoScript 的 Firefox 更安全 :-)\n\n常见问题解答:<a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a4a623eb90a9becd02eed…">https://noscript.net/faq</a>\n论坛:<a rel=\"nofollow\" href=\"https://prod.outgoing.prod.webservices.mozgcp.net/v1/8a6b9e607349db8d83719e…">https://noscript.net/forum</a>"
},
"developer_comments": {
"en-US": "Security issues affecting Firefox or the Tor Browser which can be fixed by a NoScript update are guaranteed to be addressed within 24 hours. This sometimes requires many updates to be issued in a short timespan, and when this happens you may notice NoScript UI's asking to \"<em>reload this page in order to operate properly</em>\". This is normal on \"live\" updates, and it just means the UI is out of sync with the page content, but there's no need to worry as <strong>all the restrictions to scripts and active content are still in place</strong>.",
@@ -2619,12 +2618,12 @@
960,
727
],
- "image_url": "https://addons.mozilla.org/user-media/previews/full/267/267408.png?modified…",
+ "image_url": "https://addons.mozilla.org/user-media/previews/full/267/267408.png?modified…",
"thumbnail_size": [
528,
400
],
- "thumbnail_url": "https://addons.mozilla.org/user-media/previews/thumbs/267/267408.jpg?modifi…"
+ "thumbnail_url": "https://addons.mozilla.org/user-media/previews/thumbs/267/267408.jpg?modifi…"
},
{
"id": 267511,
@@ -2635,12 +2634,12 @@
717,
542
],
- "image_url": "https://addons.mozilla.org/user-media/previews/full/267/267511.png?modified…",
+ "image_url": "https://addons.mozilla.org/user-media/previews/full/267/267511.png?modified…",
"thumbnail_size": [
529,
400
],
- "thumbnail_url": "https://addons.mozilla.org/user-media/previews/thumbs/267/267511.jpg?modifi…"
+ "thumbnail_url": "https://addons.mozilla.org/user-media/previews/thumbs/267/267511.jpg?modifi…"
},
{
"id": 267512,
@@ -2651,12 +2650,12 @@
717,
542
],
- "image_url": "https://addons.mozilla.org/user-media/previews/full/267/267512.png?modified…",
+ "image_url": "https://addons.mozilla.org/user-media/previews/full/267/267512.png?modified…",
"thumbnail_size": [
529,
400
],
- "thumbnail_url": "https://addons.mozilla.org/user-media/previews/thumbs/267/267512.jpg?modifi…"
+ "thumbnail_url": "https://addons.mozilla.org/user-media/previews/thumbs/267/267512.jpg?modifi…"
}
],
"promoted": {
@@ -2667,10 +2666,10 @@
"category": "recommended"
},
"ratings": {
- "average": 4.3956,
- "bayesian_average": 4.3929050879959695,
- "count": 2174,
- "text_count": 837
+ "average": 4.399,
+ "bayesian_average": 4.396311536554253,
+ "count": 2193,
+ "text_count": 842
},
"ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/noscript/reviews/",
"requires_payment": false,
@@ -2714,7 +2713,7 @@
"type": "extension",
"url": "https://addons.mozilla.org/en-US/firefox/addon/noscript/",
"versions_url": "https://addons.mozilla.org/en-US/firefox/addon/noscript/versions/",
- "weekly_downloads": 7240
+ "weekly_downloads": 7405
},
"notes": null
},
@@ -2730,7 +2729,7 @@
"picture_url": null
}
],
- "average_daily_users": 161419,
+ "average_daily_users": 162666,
"categories": {
"firefox": [
"photos-music-videos",
@@ -2839,10 +2838,10 @@
"category": "recommended"
},
"ratings": {
- "average": 3.8734,
- "bayesian_average": 3.8693074295625123,
- "count": 1224,
- "text_count": 443
+ "average": 3.8694,
+ "bayesian_average": 3.8653261105375534,
+ "count": 1233,
+ "text_count": 447
},
"ratings_url": "https://addons.mozilla.org/en-US/firefox/addon/youtube-high-definition/revi…",
"requires_payment": false,
@@ -2861,7 +2860,7 @@
"type": "extension",
"url": "https://addons.mozilla.org/en-US/firefox/addon/youtube-high-definition/",
"versions_url": "https://addons.mozilla.org/en-US/firefox/addon/youtube-high-definition/vers…",
- "weekly_downloads": 1652
+ "weekly_downloads": 1444
},
"notes": null
}
=====================================
projects/browser/config
=====================================
@@ -100,9 +100,9 @@ input_files:
name: ublock-origin
sha256sum: f5fbeeac511ca4e10a74723413727fda8e6f9236c726d16eb54ade1fbe7be5be
enable: '[% c("var/mullvad-browser") %]'
- - URL: https://github.com/mullvad/browser-extension/releases/download/v0.8.5-firef…
+ - URL: https://github.com/mullvad/browser-extension/releases/download/v0.9.0-firef…
name: mullvad-extension
- sha256sum: b8208cc73d3c3c87342b25367b1a5fa330cb528f3213a4c4de30512f1662ff45
+ sha256sum: 65bf235aa1015054ae0a54a40c5a663e67fe1d0f0799e7b4726f98cccc7f3eab
enable: '[% c("var/mullvad-browser") %]'
- filename: 'gtk3-settings.ini'
enable: '[% c("var/linux") %]'
=====================================
projects/firefox-android/config
=====================================
@@ -16,7 +16,7 @@ container:
var:
fenix_version: 115.2.1
browser_branch: 13.5-1
- browser_build: 7
+ browser_build: 8
variant: Beta
# This should be updated when the list of gradle dependencies is changed.
gradle_dependencies_version: 1
=====================================
projects/firefox/config
=====================================
@@ -18,7 +18,7 @@ var:
firefox_version: '[% c("var/firefox_platform_version") %]esr'
browser_series: '13.5'
browser_branch: '[% c("var/browser_series") %]-1'
- browser_build: 1
+ browser_build: 2
branding_directory_prefix: 'tb'
copyright_year: '[% exec("git show -s --format=%ci").remove("-.*") %]'
nightly_updates_publish_dir: '[% c("var/nightly_updates_publish_dir_prefix") %]nightly-[% c("var/osname") %]'
=====================================
projects/geckoview/config
=====================================
@@ -16,7 +16,7 @@ container:
var:
geckoview_version: 115.9.0esr
browser_branch: 13.5-1
- browser_build: 1
+ browser_build: 2
copyright_year: '[% exec("git show -s --format=%ci").remove("-.*") %]'
gitlab_project: https://gitlab.torproject.org/tpo/applications/tor-browser
git_commit: '[% exec("git rev-parse HEAD") %]'
=====================================
projects/go/config
=====================================
@@ -1,5 +1,5 @@
# vim: filetype=yaml sw=2
-version: '[% IF c("var/use_go_1_20") %]1.20.14[% ELSE %]1.21.7[% END %]'
+version: '[% IF c("var/use_go_1_20") %]1.20.14[% ELSE %]1.21.8[% END %]'
filename: '[% project %]-[% c("version") %]-[% c("var/osname") %]-[% c("var/build_id") %].tar.[% c("compress_tar") %]'
container:
use_container: 1
@@ -120,10 +120,12 @@ input_files:
project: '[% c("var/compiler") %]'
enable: '[% ! c("var/linux") %]'
- URL: 'https://go.dev/dl/go[% c("version") %].src.tar.gz'
+ # 1.21 series
name: go
- sha256sum: 00197ab20f33813832bff62fd93cca1c42a08cc689a32a6672ca49591959bff6
+ sha256sum: dc806cf75a87e1414b5b4c3dcb9dd3e9cc98f4cfccec42b7af617d5a658a3c43
enable: '[% !c("var/use_go_1_20") %]'
- URL: 'https://go.dev/dl/go[% c("version") %].src.tar.gz'
+ # 1.20 series
name: go
sha256sum: 1aef321a0e3e38b7e91d2d7eb64040666cabdcc77d383de3c9522d0d69b67f4e
enable: '[% c("var/use_go_1_20") %]'
=====================================
projects/manual/config
=====================================
@@ -1,7 +1,7 @@
# vim: filetype=yaml sw=2
# To update, see doc/how-to-update-the-manual.txt
# Remember to update also the package's hash, with the version!
-version: 136210
+version: 150100
filename: 'manual-[% c("version") %]-[% c("var/build_id") %].tar.[% c("compress_tar") %]'
container:
use_container: 1
@@ -23,6 +23,6 @@ input_files:
- project: container-image
- URL: 'https://build-sources.tbb.torproject.org/manual_[% c("version") %].zip'
name: manual
- sha256sum: 6731381fd992cf65dd01e56e2b924005af633369da5ac9eb905fd8025255b386
+ sha256sum: 039bdb04f97b803f0db2f12a6ba0a03a2091e8d8bd794e178c297e571f04eb7f
- filename: packagemanual.py
name: package_script
=====================================
projects/translation/config
=====================================
@@ -12,19 +12,19 @@ compress_tar: 'gz'
steps:
base-browser:
base-browser: '[% INCLUDE build %]'
- git_hash: 3215fb9ae37cb115b607647122f0984a8a428b16
+ git_hash: 891785fda28488bfe599afc8d3b9a155c0130f5f
targets:
nightly:
git_hash: 'base-browser'
tor-browser:
tor-browser: '[% INCLUDE build %]'
- git_hash: f1a4b3d9af145b062b1a5b0cf2b83bd6bfcd03bb
+ git_hash: 020ff1e1fd29f39a75d1d7f795a4d80996472dd5
targets:
nightly:
git_hash: 'tor-browser'
mullvad-browser:
mullvad-browser: '[% INCLUDE build %]'
- git_hash: 57de1569da0e2c48fd999a13e555f6b522041993
+ git_hash: c5361cb496ae7e047fd9226139537f1fcfc7938d
targets:
nightly:
git_hash: 'mullvad-browser'
@@ -32,7 +32,7 @@ steps:
fenix: '[% INCLUDE build %]'
# We need to bump the commit before releasing but just pointing to a branch
# might cause too much rebuidling of the Firefox part.
- git_hash: 44409d6f28faf0e332a00d53de67879de41bf07c
+ git_hash: 4962bd88652169e6a98afbe1d3b25847e909d213
compress_tar: 'zst'
targets:
nightly:
=====================================
rbm.conf
=====================================
@@ -73,12 +73,12 @@ buildconf:
git_signtag_opt: '-s'
var:
- torbrowser_version: '13.5a5'
- torbrowser_build: 'build2'
+ torbrowser_version: '13.5a6'
+ torbrowser_build: 'build1'
torbrowser_incremental_from:
+ - '13.5a5'
- '13.5a4'
- '13.5a3'
- - '13.5a2'
updater_enabled: 1
build_mar: 1
mar_channel_id: '[% c("var/projectname") %]-torproject-[% c("var/channel") %]'
=====================================
tools/fetch-manual.py
=====================================
@@ -75,7 +75,7 @@ else:
sha256.update(chunk)
print(f"File downloaded as {manual_file}.")
print(
- "Please upload it to people.torproject.org and then update projects/manual/config:"
+ "Please upload it to tb-build-02.torproject.org:~tb-builder/public_html/. and then update projects/manual/config:"
)
sha256 = sha256.hexdigest()
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/d…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/commit/d…
You're receiving this email because of your account on gitlab.torproject.org.