-
Notifications
You must be signed in to change notification settings - Fork 688
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SVGs are disabled with Tor Browser high security; replace with PNGs #1574
Comments
are there a lot of SVGs? This should be low-hanging fruit unless I messed up my basic linux commands...
|
FYI this is done in #1567 targeted for the next release |
As of commit b83f219:
|
@redshiftzero Your PR doesn't include the new ones for the 0.4 release.
|
Gang: I've created SVG code files that relieve our dependence on font-awesome everything. @micahflee is TOR unable to still read/parse images directly in the code—wholly independent of font-awesome? |
That's true, and intended, since #1567 is targeting the 0.3.11 release. We're simply trying to update the Source Interface to display instructions clearly, given new versions of Tor Browser, and also to ensure that the icons render correctly. Leaving this issue open as a reminder to close the gap on the remaining SVG -> PNG elements. |
@conorsch I've spec'd SVG code (like, hard-coding the SVG into the html, no font-awesome anything) for 0.4. Can these also work in 0.3.11... or must they all REALLY be .png files? I'd truly just prefer to ditch the button icons all together, since they add between little to no value (which I realize is harsh, but it's honest!) /cc @micahflee Below is an example of the "drive" icon for the upload page (i'll create the other icons once my viability question is clarified): |
@ninavizz When the Tor Browser Security Slider is set to High, the SVG parser is disabled entirely. SVGs will not work at all. See https://trac.torproject.org/projects/tor/ticket/12827. This was done to mitigate concerns about security vulnerabilities in the SVG parser, including one that was used in the wild to deanonymize Tor users: https://blog.mozilla.org/security/2016/11/30/fixing-an-svg-animation-vulnerability/. |
Ugh. That SUCKS!!! Thank you much @garrettr, for the clarification & background on that. :) I'll get cracking on some PNG files, then. :/ |
This has been fixed for the SI, but not the JI. We might not fix it for the JI and instead resolve the issue via the RR client. |
The Journalist Interface does not use SVGs anymore either. It does use FontAwesome glyphs, which are also disabled in "Safest". We should track this separately given the long and confusing history of this issue. There are currently some SVGs in the repo which are not used anywhere. They do come in handy for re-generating PNGs if/when needed, so we may want to keep them around. |
@micahflee reported that SVGs are disabled by the high security setting in Tor Browser here #1480 (comment).
Possible solutions would be to either a) have a fall back to PNG or b) ditch the SVGs entirely and only use PNGs (or some other format).
The text was updated successfully, but these errors were encountered: