Safebrowsing prefs got renamed and features got added. We should make sure Safebrowsing is still disablled in ESR 52, though. For starters we could set
Trac: Description: Safebrowsing prefs got renamed and features got added. We should make sure Safebrowsing is still enabled in ESR 52, though. For starters we could set
Safebrowsing prefs got renamed and features got added. We should make sure Safebrowsing is still disablled in ESR 52, though. For starters we could set
browser.safebrowsing.downloads.enabled = false
browser.safebrowsing.downloads.remote.enabled = false
browser.safebrowsing.malware.enabled = false
browser.safebrowsing.phishing.enabled = false
browser.safebrowsing.blockedURIs.enabled = false Summary: Make sure safebrowsing is still enabled in ESR 52 to Make sure safebrowsing is still disabled in ESR 52
https://bugzilla.mozilla.org/show_bug.cgi?id=134105#c154
Is that a joke or what?! Lamers from Mozilla say they can't reproduce DNS leaks anymore. So they are waiting for TTP to explain them what else needs to be fixed to resolve that 15 years old bug!
Trac: Status: new to needs_information Priority: Medium to High Severity: Normal to Major
r=brade, r=mcs
Looks good to us. We also saw the following URL-based prefs but maybe they are only used for secondary queries?
{{{
browser.safebrowsing.provider.google.gethashURL
browser.safebrowsing.provider.google4.gethashURL
browser.safebrowsing.provider.mozilla.gethashURL
}}}
I think so. But, however, I set them to "" as well in commit e6b28367e061f9b6912c3b150383255bdff0ef5c tor-browser-52.1.0esr-7.0-2 as this makes things more clear and doesn't hurt.
Trac: Resolution: N/Ato fixed Status: needs_review to closed