We are still getting HTTPS-E updates outside of our updater.
When we ship a new version of HTTPS-E with a new release of Tor Browser, we arrange for it to be "force updated" (files replaced) so that the user is left with a known version of HTTPS-E which has been tested with TB. Interim updates are still retrieved from addons.mozilla.org using the extension update mechanism so users can get updates if desired. We use the same approach for NoScript.
Do we want to do something different? If not, then this bug can be closed.
I think we want to have a ticket about shipping HTTPS-E solely via our updater, disabling update pings to EFF. I thought there was already a ticket for this but I did not found one and thought this one might fit.
Trac: Description: N/A
to
Let's think about shipping HTTPS-Everywhere solely via our updater, disabling update pings for that extension as well. Milestone: Chronos: phase two toN/A Type: project to task Keywords: N/Adeleted, tbb-security added
Interim updates are still retrieved from addons.mozilla.org using the extension update mechanism
No. From EFF.
so users can get updates if desired.
What does it mean (desired)? Update Add-ons Automatically is selected by default.
We use the same approach for NoScript.
No. But, maybe, it's better to use the same, because recent updates led to 5.2.0 on alpha, 5.1.x on stable and 5.2.1 on AMO.
Interim updates are still retrieved from addons.mozilla.org using the extension update mechanism
No. From EFF.
Thanks. My mistake.
so users can get updates if desired.
What does it mean (desired)? Update Add-ons Automatically is selected by default.
It means users do have a way to disable updates if they want to do so. But most will keep the default setting.
We use the same approach for NoScript.
No. But, maybe, it's better to use the same, because recent updates led to 5.2.0 on alpha, 5.1.x on stable and 5.2.1 on AMO.
There is a policy question here: should we disable updates for bundled extensions. By allowing updates from EFF or AMO, we risk that users may get a version of an extension that is somehow incompatible with Tor Browser. But by allowing updates we ensure that users will have the latest (and hopefully most secure) versions of HTTPS-E and NoScript.
we want to have a ticket about shipping HTTPS-E solely via our updater
Maybe, you mean your update servers instead of AMO, or you'll have to make a new release of TBB for every update.
I heard we are close to be able to test that. Hopefully this can already happen in the next regular alpha release. Putting it on our radar for November.
Trac: Keywords: N/Adeleted, TorBrowserTeam201711 added Status: reopened to assigned