<feed xmlns='http://www.w3.org/2005/Atom'>
<title>tor-browser/sandboxed-tor-browser, branch sandboxed-tor-browser-0.0.10</title>
<subtitle>Sandboxed Tor Browser</subtitle>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/tor-browser/sandboxed-tor-browser.git/'/>
<entry>
<title>Do the release ritual for sandboxed-tor-browser-0.0.10.</title>
<updated>2017-07-12T20:20:03+00:00</updated>
<author>
<name>Yawning Angel</name>
<email>yawning@schwanenlied.me</email>
</author>
<published>2017-07-12T20:20:03+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/tor-browser/sandboxed-tor-browser.git/commit/?id=4ae2a41d0b0d74bf72374b31bf3defb994da4a38'/>
<id>4ae2a41d0b0d74bf72374b31bf3defb994da4a38</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 22899: `about:addons`'s "Get Addons" pane is unsafe and should be treated as such.</title>
<updated>2017-07-12T20:04:38+00:00</updated>
<author>
<name>Yawning Angel</name>
<email>yawning@schwanenlied.me</email>
</author>
<published>2017-07-12T20:04:38+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/tor-browser/sandboxed-tor-browser.git/commit/?id=e06085d63ed1d9b33787e04172365db2179003e1'/>
<id>e06085d63ed1d9b33787e04172365db2179003e1</id>
<content type='text'>
Loading Google Analytics as part of an IFRAME that implements an
internal `about:` URL, without being explicitly opt-in is the total
antithesis of privacy respecting.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Loading Google Analytics as part of an IFRAME that implements an
internal `about:` URL, without being explicitly opt-in is the total
antithesis of privacy respecting.
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 22901: Clarify/expand on the warnings for all the config settings.</title>
<updated>2017-07-12T20:03:10+00:00</updated>
<author>
<name>Yawning Angel</name>
<email>yawning@schwanenlied.me</email>
</author>
<published>2017-07-12T19:47:14+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/tor-browser/sandboxed-tor-browser.git/commit/?id=a147a72f3fc33b1977a8402f17a46b79db410018'/>
<id>a147a72f3fc33b1977a8402f17a46b79db410018</id>
<content type='text'>
I should have done this to begin with, and part of me wants to deprecate
all of these options entirely, but people will complain.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
I should have done this to begin with, and part of me wants to deprecate
all of these options entirely, but people will complain.
</pre>
</div>
</content>
</entry>
<entry>
<title>fixup! Bug 22853: Something in Ubuntu's libraries is totally brain damaged.</title>
<updated>2017-07-08T00:31:06+00:00</updated>
<author>
<name>Yawning Angel</name>
<email>yawning@schwanenlied.me</email>
</author>
<published>2017-07-08T00:31:01+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/tor-browser/sandboxed-tor-browser.git/commit/?id=9daf66dfad4096d5600cc78849f0df022924cd89'/>
<id>9daf66dfad4096d5600cc78849f0df022924cd89</id>
<content type='text'>
Only enable the workaround for the alpha series, and only if the version
is 7.5a2 or older, on the assumption that since it's fixed upstream it
will be reflected in the next Tor Browser alpha build.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Only enable the workaround for the alpha series, and only if the version
is 7.5a2 or older, on the assumption that since it's fixed upstream it
will be reflected in the next Tor Browser alpha build.
</pre>
</div>
</content>
</entry>
<entry>
<title>fixup! Bug 22853: Something in Ubuntu's libraries is totally brain damaged.</title>
<updated>2017-07-07T18:42:11+00:00</updated>
<author>
<name>Yawning Angel</name>
<email>yawning@schwanenlied.me</email>
</author>
<published>2017-07-07T18:41:59+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/tor-browser/sandboxed-tor-browser.git/commit/?id=0bc11b69682026c3c01ef0a36e5cbf4babd17798'/>
<id>0bc11b69682026c3c01ef0a36e5cbf4babd17798</id>
<content type='text'>
This actually is a SelfRando bug.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This actually is a SelfRando bug.
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 22853: Something in Ubuntu's libraries is totally brain damaged.</title>
<updated>2017-07-07T15:51:35+00:00</updated>
<author>
<name>Yawning Angel</name>
<email>yawning@schwanenlied.me</email>
</author>
<published>2017-07-07T15:51:35+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/tor-browser/sandboxed-tor-browser.git/commit/?id=f3ab9d888beffe2d567fb7d9a0385148a6ef9517'/>
<id>f3ab9d888beffe2d567fb7d9a0385148a6ef9517</id>
<content type='text'>
Work around mass stupidity observed on Ubuntu.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Work around mass stupidity observed on Ubuntu.
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 22829: Remove default obfs4 bridge riemann.</title>
<updated>2017-07-06T02:36:21+00:00</updated>
<author>
<name>Yawning Angel</name>
<email>yawning@schwanenlied.me</email>
</author>
<published>2017-07-06T02:36:21+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/tor-browser/sandboxed-tor-browser.git/commit/?id=2f82b3f210b4b0ed945a73052151c401624799ef'/>
<id>2f82b3f210b4b0ed945a73052151c401624799ef</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Bump the version to 0.0.10-dev.</title>
<updated>2017-07-03T18:32:57+00:00</updated>
<author>
<name>Yawning Angel</name>
<email>yawning@schwanenlied.me</email>
</author>
<published>2017-07-03T18:32:57+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/tor-browser/sandboxed-tor-browser.git/commit/?id=fe7aff99339299ced64ad715007f8beb10469cb7'/>
<id>fe7aff99339299ced64ad715007f8beb10469cb7</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Do the release ritual for sandboxed-tor-browser-0.0.9.</title>
<updated>2017-07-03T18:30:29+00:00</updated>
<author>
<name>Yawning Angel</name>
<email>yawning@schwanenlied.me</email>
</author>
<published>2017-07-03T18:30:29+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/tor-browser/sandboxed-tor-browser.git/commit/?id=2bb57dc2451666035af6a7e12a7e32a20064e5b3'/>
<id>2bb57dc2451666035af6a7e12a7e32a20064e5b3</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Bug 20773: Stop mounting /proc in the Tor Browser container.</title>
<updated>2017-07-03T17:27:35+00:00</updated>
<author>
<name>Yawning Angel</name>
<email>yawning@schwanenlied.me</email>
</author>
<published>2017-07-03T17:27:35+00:00</published>
<link rel='alternate' type='text/html' href='https://gitweb.torproject.org/tor-browser/sandboxed-tor-browser.git/commit/?id=95857360ec7f84cf9f0a01855c15881c89919133'/>
<id>95857360ec7f84cf9f0a01855c15881c89919133</id>
<content type='text'>
Wasn't so bad to figure out, though upstream still should fall back
gracefully, since the only reason why it crashes horribly is because
pthread_attr_getstack() returns a stack size of 0 for the default thread
when /proc is missing.

In our case we can safely fall back to querying RLIMIT_STACK, because
the sandbox containerization explicity sets it to something large, but
relatively sane.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Wasn't so bad to figure out, though upstream still should fall back
gracefully, since the only reason why it crashes horribly is because
pthread_attr_getstack() returns a stack size of 0 for the default thread
when /proc is missing.

In our case we can safely fall back to querying RLIMIT_STACK, because
the sandbox containerization explicity sets it to something large, but
relatively sane.
</pre>
</div>
</content>
</entry>
</feed>
