Skip to content
GitLab
Projects Groups Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • Tor Browser Tor Browser
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 835
    • Issues 835
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 7
    • Merge requests 7
  • Deployments
    • Deployments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • Repository
  • Wiki
    • Wiki
  • Activity
  • Graph
  • Create a new issue
  • Commits
  • Issue Boards
Collapse sidebar
  • The Tor Project
  • Applications
  • Tor BrowserTor Browser
  • Issues
  • #41036
Closed
Open
Issue created Jun 23, 2022 by boyska@boyska

Add a preference to disable OnionAlias

At Tails, we use Tor Browser in two different ways:

  • the Tor Browser
  • the Unsafe Browser, which actually uses the clearnet.

For the Unsafe Browser, the OnionAlias feature makes no sense, because it cannot resolve onion addresses anyway. Not only that, but having it means that just opening the Unsafe Browser makes a DNS query to securedrop.org. This makes it very easy to fingerprint a Tails user (if they are using the Unsafe Browser, at least).

Therefore, we'd like to have a preference in prefs.js that disables this mechanism altogether.

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking