Personal Sandboxed Tor Browser development repo. https://gitweb.torproject.org/tor-browser/sandboxed-tor-browser.git/
|Yawning Angel f1982a1f09 fixup! Bug 25154: Fix a content process crash on JS heavy pages.||2 months ago|
|data||6 months ago|
|src||2 months ago|
|vendor||1 year ago|
|.gitignore||1 year ago|
|CODE_OF_CONDUCT.md||11 months ago|
|ChangeLog||2 months ago|
|LICENSE||1 year ago|
|Makefile||1 year ago|
|README.md||10 months ago|
I would build a great sandbox. And nobody builds sandboxes better than me, believe me. I will build a great, great sandbox on our application border. And I will have Tor Browser pay for that sandbox.
Tor Browser sandboxed somewhat correctly using bubblewrap. Obviously only works on Linux, and will NEVER support anything else since sandboxing is OS specific.
There are several unresolved issues that affect security and fingerprinting. Do not assume that this is perfect, merely "an improvement over nothing".
Build time dependencies:
Things that the sandbox breaks:
Places where the sandbox could be better:
/procfilesystem, worked around in the worst possible way. (https://bugs.torproject.org/20283)
~/Downloadsdirectories are mapped to the host