Moved from the Long wiki edits thread.
Re: Tor Browser ESR 52.0.2 Nightly Test
The ESR 52 nightly build is from the 6th April, so hopefully they have fixed many of these issues / bugs below.
We have first nightly builds based on Firefox 52.0.2esr available:
The location is a bit unusual but we hit an issue in our nightly build Gitian setup which made some tweaking to our usual build and upload process necessary. Nevertheless, please give this nightly a test if you can as we don't have much time left before the first alpha based on ESR 52 is due.
Tested and (mostly) working in Whonix!
- There is some weird maximizing windows behaviour when checking the "About Tor" button and Add-ons settings (already reported to Tor Project), but it confirms it is FF ESR 52.0.2.
- They haven't disabled Pocket yet.
- The Youtube test hangs first time when the security slider is set to medium (but got it working eventually).
- Restart Browser (New Identity) maximized and really didn't want to restart unless the "x" button was hit. I had to manually kill another Tor Browser instance after the new Tor Browser popped up (due to the Youtube error).
This AppArmor message appears, but Tor Browser still works:
apparmor="DENIED" operation="open" profile="/home/**/tor-browser*/Browser/firefox" name="/proc/2616/net/route" pid=[redacted] comm=[redacted - long weird set of numbers and letters] requested_mask="r" denied_mask="r" fsuid=1000 ouid=0
Sandbox Options all read true
Seccomp-BPF (System Call Filtering) true
Seccomp Thread Synchronization true
User Namespaces true
Media Plugin Sandboxing true
e10s is (was) still not enabled in Linux
The Tor Project was still working on it at that time.
Multiprocess Windows 0/1 (Disabled)
JonDoNym, BrowserLeaks, Panopticlick etc. seem to treat it like the normal Tor Browser, that is, not much showing.
However, the fingerprint was completely unique out of 35,000 odd browsers on Panopticlick, since obviously nobody is (was) running Tor Browser ESR 52 in general.
General Other Tests
- Restart Browser Test (but with quirks as noted) -> works.
- .onion Test -> works (but notes .onions show an insecure padlock, go figure).
- New Tor Circuit -> works.
- Updating Add-ons -> works.
- Youtube (but with quirks as noted) -> works.
- Online gaming (simple) -> works.
- Twitter > works.
- Github -> works.
- Whonix.org -> works.
- Search engines -> works
- Other -> Didn't test.
Basically, it is useable in Whonix but very fingerprintable right now. This is particularly true since it wants to periodically maximize the window when you hit some of the menu options.