[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [tor-talk] Tor on Arm Device
On Wed, Feb 18, 2015 at 02:38:42AM +0100, firstname.lastname@example.org wrote:
> On Tue, 17 Feb 2015 20:21:54 -0500
> t <email@example.com> wrote:
> > I've already installed NoScript & HTTPS Everywhere... but how else can I
> > secure my local copy of Firefox to match the security offered by the
> > pre-assembled Tor Brower?
> Just a guess, but maybe you can just copy
> tor-browser_en-US/Browser/TorBrowser/Data/Browser/profile.default/prefs.js and
> and similar setting files?
Unfortunately, the longer answer is that you're not going to match the
security offered by Tor Browser in this way.
Currently Tor Browser is a fork of Firefox, meaning there are 100+
patches applied to the code before it's built:
and some of the patches close serious privacy vulnerabilities that
Mozilla for whatever reason hasn't chosen to address.
You can read more about Tor Browser's goals here:
and an old but still useful discussion of attacks to consider is here:
So in conclusion, I would recommend against acting as though you've
made your arm Firefox thing 'close enough' to Tor Browser.
tor-talk mailing list - firstname.lastname@example.org
To unsubscribe or change other settings go to