Hey everybody, I want to announce that our server is up again. Thank you all for your suggestions, we're opening issues for each one in the Github repository. I want to thank David Fifield for reporting us the security issue.
Regarding the stored website's url information, we're evaluating the insertion of a checkbox that allows the user to choose if he/she wants to send it or not. 2017-03-15 18:47 GMT+01:00 Philipp Winter <p...@nymity.ch>: > On Fri, Mar 10, 2017 at 06:25:04PM +0100, Massimo La Morgia wrote: > > On Fri, Mar 10, 2017 at 5:39 PM, David Fifield <da...@bamsoftware.com> > wrote: > > > Your extension reports not only the onion domains that it > > > finds, but also the URL of the page you were browsing at the time: > > > var onionsJson = JSON.stringify({onions:onions, website: > > > window.location.href}); > > > You need to at least inform your research subjects/users what of their > > > private data you are storing and what you are doing with it. > > > > As you can see from the source code we are not storing any sensitive data > > like ip or users information. do you think that only URL page can damage > > user privacy? > > Yes, web applications encode sensitive information in URLs all the time. > Usernames, passwords, personal preferences, you name it. Even just the > page's domain name reveals a lot about you -- think about somebody > visiting google.it versus google.dk. > _______________________________________________ > tor-dev mailing list > tor-dev@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev >
_______________________________________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev