Another possibility is to show a warning when a homographic domain is displayed. Showing a punycode by default has the disadvantage that it becomes unreadable for non-latin domains.
I wonder where this is now being discussed on the Mozilla side. Comments on the Bugzilla bug were closed after an FAQ was published (which I read), but now the FAQ is gone. See:
https://bugzilla.mozilla.org/show_bug.cgi?id=1332714#c78
Trac: Cc: ikurua22, mcs to ikurua22, mcs, brade Summary: shoult torbrowser enable network.IDN_show_punycode by default? to should torbrowser enable network.IDN_show_punycode by default?
The fact that Chrome/Chromium has this mitigated, while Firefox has stubbornly refused to change their behavior, calling it someone else's problem, is one of the many reasons that people (rightfully) criticize Firefox and its devs for having poor security. Imagine how easy it would be for an administrator of a dissident website, or the code repository website for a critical or popular program (such as Tor?) to be compromised.
Perhaps only enable the punycode feature when not on the lowest security level? The description in the browser security slider could say "Domains with unicode may not display properly", with the mouseover text saying "Characters that can be used to create a domain that looks identical to an existing domain will be displayed differently".
I'm going to have to require all the important members of a website I own to log in exclusively using client certificates, since they will only work on the correct domain. I would much rather if I did not have to do something which has an impact on my users just because poorly-secured browsers insist on this being someone else's problem.
A good title would also be very hard to notice Phishing Scam - Firefox / Tor Browser URL not showing real Domain Name - Homograph attack (Punycode).
https://www.xn--80ak6aa92e.com/ shows up as apple.com. Even including green SSL lock. But it is a demonstration, proof of concept of a phishing side by a security researcher.
https://www.xn--80ak6aa92e.com/ shows up as https://www.apple.com.
We should think about and understand the usability implications of simply flipping the pref. How do other browsers handle this and what should the user do when they see the url rewritten? How do we make sure people actually notice something is (possibly) wrong while not scaring them or confusing them when it is a false-positive?
(To be clear, I haven't investigated this at all, these are simply questions I have from skimming this ticket)
Trac: Keywords: N/Adeleted, TorBrowserTeam201912 added Cc: ikurua22, mcs, brade, qbi, intrigeri, anonym, arthuredelstein, floweb to ikurua22, mcs, brade, qbi, intrigeri, anonym, arthuredelstein, floweb, ux-team Status: needs_review to needs_information Priority: Immediate to High Severity: Major to Normal