On Fri, Mar 21, 2014 at 7:40 AM, Irving Reid <irv...@mozilla.com> wrote:
> extensions.blocklist.pingCountVersion (146 times out of ~1.5 million Nightly
> telemetry sessions) and extensions.shownSelectionUI (8 times in 1.5m)

> The prefs in question aren't likely targets for malware, though they could
> be collateral damage. They don't have default values in all.js.

Doesn't corrupting them allow you to prevent the blocklist from
working, and preventing the "choose which extensions to install"
dialog from appearing on startup? Those sound like things malware
would want to do.

Gavin
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to