-VladV-

Acerca de mim

Informação do programador
Nome -VladV-
Utilizador desde Jan. 25, 2009
Número de extras desenvolvidos 0 extras
Avaliação média dos extras do programador Ainda sem avaliação

Minhas análises

Perspectives

Avaliado com 5 de 5 estrelas

I've checked current version (4.0), and it seems that the issues are mentioned earlier have been resolved. I don't see any unnecessary DNS lookups, and all the traffic goes via proxy if it is configured in Firefox.

Requests to Notaries stay non-encrypted, but this probably does not a pose any serious risk.

Esta análise é para uma versão anterior do extra (4.0).  Este utilizador tem 2 revisões anteriores deste extra.

Perspectives

Avaliado com 5 de 5 estrelas

I've checked current version (4.0), and it seems that the issues are mentioned earlier have been resolved. I don't see any unnecessary DNS lookups, and all the traffic goes via proxy if it is configured in Firefox.

Requests to Notaries stay non-encrypted, but this probably does not a pose any serious risk.

Esta análise é para uma versão anterior do extra (4.0).  Este utilizador tem outras revisões deste extra.

Perspectives

Avaliado com 4 de 5 estrelas

A great add-on to mitigate possible MITM attacks.
However, in its current implementation (version 3.0.3) it compromises user's privacy by potentially letting an adversary know what sites the user visits.

1) DNS request leaks.
The addon performs a DNS lookup when user loads an HTTPS site or (!) switches to a tab where such site is open. Which is worse, it doesn't honor FF proxy settings and performs DNS lookup directly even if a proxy supporting DNS lookups is being used (for instance, user is browsing via Tor).

2) Requests to the Network Notaries.
The addon makes requests to the Notaries to check the certificates. These requests are sent in plain text (as HTTP GET), so any adversary who can see this traffic could know what site was visited by this particular user.

Esta análise é para uma versão anterior do extra (3.0.3).