Tor Browser currently pings Mozilla for a (limited) number of things, such as add-on update pings. (At least that's what I'm told, it sounds plausible.)
Mozilla is interested in providing .onions for the endpoints TB uses.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
NoScript Update Check should be part of the Add-On update check (called VersionCheck).
Does TBB receive OneCRL data from firefox.settings.services.mozilla.com or the AMO Blocklist?
This is a near-complete list, I think. It does NOT include every place that Tor Browser links to a website, but it hopefully contains every automated behind the scenes call to Mozilla websites and it does include some links also.
There's some stuff about media.gmp* but I'm not sure what this is...
Firefox Sync
Left uninvestigated due to the assumption that while I believe you can use this in Tor Browser, that no one does. (and I have no idea how it would behave)
I researched what would happen if Mozilla's blocklist was used against the Tor add-ons. The next restart of Tor Browser would have the add-ons disabled; and browsing would not work, giving an error that the proxy server is refusing connections.
I confirmed that extensions.systemAddons were not enabled. I also put some random other notes in #19048 (moved)
Based off of all of this I am going to propose Mozilla start with one of the following with the choice probably being whichever one is easiest:
https://versioncheck.addons.mozilla.org - This one may be most preferable, as the version check can be initiated by the user, which allows for easy testing.
gmp (Gecko Media Plugin) is for EME. I believe it is a generic extension point and not 'the one single EME' but that EMEs are built to live inside it. I hope we don't have to worry about it because we disable EME
browser.safebrowsing (aka Shavar) is disabled but would be another thing that polls
An onion service for addons.mozilla.org would be awesome, because addons.m.o keeps being the center of attention in various "what if they can mess with the cert" attacks.
Is there any new thinking here? Is somebody waiting for v3 onion services to be a thing? Would they want to set them up with some sort of onionbalance framework, for robustness? It would be nice to have a checklist of desired features/steps, so we can work to check them off, and so we can notice when the list has become empty.
Is there any new thinking here? Is somebody waiting for v3 onion services to be a thing? Would they want to set them up with some sort of onionbalance framework, for robustness? It would be nice to have a checklist of desired features/steps, so we can work to check them off, and so we can notice when the list has become empty.
There is no new thinking, and we are not waiting on any features from Tor on this. It's simply not been something the services team at Mozilla has added to their target list yet.