Determine if Tor browser bundle sandbox has been compromised
Every time tor browser bundle sandbox launcher opens Tor browser bundle, it should take a Sha2 hash of Firefox ESR and other internal files and compere it to a predetermined hash, taken during the initial launch to tell whether it's been compromise, the hash should be saved somewhere where a compromise Firefox cannot edit it. If the hash does not match the initial hash then it should give a warning to users that it needs to delete tor browser bundle and re-download/reinstall tor browser bundle. The hash should only be taken of Firefox ESR and other components that the user would not be able to change under normal operations.
Trac:
Username: Dbryrtfbcbhgf