Delivery-Date: Mon, 03 Nov 2014 13:09:02 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 450591E0323;
	Mon,  3 Nov 2014 13:09:01 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id B6F5A31267;
	Mon,  3 Nov 2014 18:08:56 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 5BDFD24BE3
 for <tor-talk@lists.torproject.org>; Mon,  3 Nov 2014 18:08:53 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id PZjL4Q4v0hhm for <tor-talk@lists.torproject.org>;
 Mon,  3 Nov 2014 18:08:45 +0000 (UTC)
Received: from mail-vc0-f177.google.com (mail-vc0-f177.google.com
 [209.85.220.177])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 15AB725ACB
 for <tor-talk@lists.torproject.org>; Mon,  3 Nov 2014 18:08:42 +0000 (UTC)
Received: by mail-vc0-f177.google.com with SMTP id hq12so2290790vcb.36
 for <tor-talk@lists.torproject.org>; Mon, 03 Nov 2014 10:08:39 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20130820;
 h=x-gm-message-state:mime-version:date:message-id:subject:from:to
 :content-type;
 bh=JHK5jHIlsbd/79IjHb1t7CT11EnSDMShzPeIj3UY3I4=;
 b=m80khOech+D1lE3UzyjvpXdiX/GvFQTioDK4CsEO2JETELBz9ciI4Z4ZqSmQEYdxch
 XXhiMb+hvS6PcIipkt8kjtyeSirZqlZIDX0Xm1n9vGXfnoiPGuzGqFUneB9ujkqY/s0Y
 O/vVa7bco9+qslPq4/hM770R/mmNzhCMjwMXAhhjVNoJbdVCZd5NaEqamrYzFHUx+thV
 9YkvhRPIcvEni91tVZ5s+0MpVE1liNmBYuNf4jCVjIV4ypTOehcZTh3uHfWpG4c2NOUI
 prk5f99ib20PgiyBTwW9n1PmWMlqn11RIi32qmiVqrSE+cTxMn0hPDrdq6L9Bl2BS1Gs
 8+hw==
X-Gm-Message-State: ALoCoQkDmZGaDbxTRD6keiQ/s18ik6HRPYaopAyNfg34ZYBSAyq1kigRKqd2nJe+7Z6JjNjwMMGV
MIME-Version: 1.0
X-Received: by 10.221.46.4 with SMTP id um4mr37994074vcb.23.1415038119175;
 Mon, 03 Nov 2014 10:08:39 -0800 (PST)
Received: by 10.31.181.15 with HTTP; Mon, 3 Nov 2014 10:08:39 -0800 (PST)
X-Originating-IP: [50.78.106.66]
Date: Mon, 3 Nov 2014 10:08:39 -0800
Message-ID: <CADw1SfEvdtayywkz3jo3gnFtDRqdwwtcV2+iRuBej4tH8h6Rqw@mail.gmail.com>
From: Cyrus Katrak <cy@kr36.co>
To: tor-talk@lists.torproject.org
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: [tor-talk] Krypton Anonymous: A Chromium Tor Browser
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

https://github.com/kr36/seaturtle

At a high level:
- Process per tab security model, with each tab owning it's own in-memory
state (cache, cookies, local storage, hsts db etc...).
- Efficiently integrated HTTPS Everywhere rules.
- Addresses some fingerprint-ability issues: Disabled geolocation, webgl,
accelerated <canvas>, static user agent, etc.
- Single tap to start a bundled Tor binary, and properly configure the
browsers proxy settings. Gave a fair amount of thought to UX and polish.

It's still early days, only builds for Android at the moment. Nobody has
seriously reviewed the code or black box tested. Lots of fingerprint
mitigation work still remains. Hoping to get feedback and suggestions for
improvement, and help.

Best,
Cy
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

