-VladV-

Despre mine

Informații dezvoltator
Nume -VladV-
Utilizator din Ian. 25, 2009
Numărul de suplimente dezvoltate 0 suplimente
Media evaluărilor suplimentelor dezvoltatorului Neevaluat încă

Recenziile mele

Perspectives

Evaluată cu 5 din 5 stele

I've checked current version (4.0), and it seems that the issues are mentioned earlier have been resolved. I don't see any unnecessary DNS lookups, and all the traffic goes via proxy if it is configured in Firefox.

Requests to Notaries stay non-encrypted, but this probably does not a pose any serious risk.

Această recenzie este pentru o versiune anterioară a suplimentului (4.0).  This user has 2 previous reviews of this add-on.

Perspectives

Evaluată cu 5 din 5 stele

I've checked current version (4.0), and it seems that the issues are mentioned earlier have been resolved. I don't see any unnecessary DNS lookups, and all the traffic goes via proxy if it is configured in Firefox.

Requests to Notaries stay non-encrypted, but this probably does not a pose any serious risk.

Această recenzie este pentru o versiune anterioară a suplimentului (4.0).  This user has other reviews of this add-on.

Perspectives

Evaluată cu 4 din 5 stele

A great add-on to mitigate possible MITM attacks.
However, in its current implementation (version 3.0.3) it compromises user's privacy by potentially letting an adversary know what sites the user visits.

1) DNS request leaks.
The addon performs a DNS lookup when user loads an HTTPS site or (!) switches to a tab where such site is open. Which is worse, it doesn't honor FF proxy settings and performs DNS lookup directly even if a proxy supporting DNS lookups is being used (for instance, user is browsing via Tor).

2) Requests to the Network Notaries.
The addon makes requests to the Notaries to check the certificates. These requests are sent in plain text (as HTTP GET), so any adversary who can see this traffic could know what site was visited by this particular user.

Această recenzie este pentru o versiune anterioară a suplimentului (3.0.3).