Hello,
I tagged sandboxed-tor-browser 0.0.12 just now.
Changes in version 0.0.12 - 2017-08-01:
* Bug 22969: Disable the addon blocklist.
* Bug 22984: Force IDNs to be displayed as punycode to thwart homograph
attacks.
* Bug 22967: Force disable crashdump reporting.
* Bug 23058: Apply the SelfRando workaround to 7.5a3 as well.
* Default disable `dom.securecontext.whitelist_onions`.
Rationale for the potentially controversial changes are as follows:
* Disabling the addon blocklist is done to thwart Mozilla from
attempting to disable extensions critical to Tor Browser
functionality.
While this would have a net negative impact on user security if
non-standard addons had security problems that required emergency
disabling, the sandbox was changed to exclude non-standard addons
when creating the container as of 0.0.11.
Enabling non-standard addons in the sandbox would require altering
the source code and rebuilding. Anyone who does that is on their
own.
* Forcing IDNs to be displayed as punycode is the mitigation for
#21961. Mozilla isn't fixing this, the Tor Browser developers are
apparently busy, so the sandbox will do it.
* Force disabling crashdump reporting is a pre-emptive opt out from
the GSOC crash reporting project. I do not have time to examine how
crash dumps are sanitized, and until I do, I will treat them as
a massive anonymity hazzard.
Till crashdumps are enabled (hopefully as an opt-in with lots of
warning labels), this will have no effect.
* Default disabling `dom.securecontext.whitelist_onions` means that
unless the user manually flips the pref, the `.onion` TLD will
retain the existing 7.0.x behavior.
As I've said before, I'm firmly against any changes that blur the
line between Onion Services and TLS with a CA signed cert. People
are free to disagree, but I'm unlikely to change my mind.
Till the pref is actually implemented, this will have no effect.
Regards,
--
Yawning Angel