Age | Commit message (Expand) | Author |
2021-07-17 | Revamp signatures and break header caching on FF...Signatures, instead of consisting of the secure salt followed by the unique
value generated from the URL, are now the unique value generated from the
policy value (which will follow them) succeeded by the URL.
CSP headers are now _always_ cleared on FF, regardless of whether the page
is whitelisted or not. This means whitelisting takes effect on page reload,
rather than only when caching occurs. However, it obviously presents security
issues; refinment will occur in a future commit.
| jahoti |
2021-07-16 | Use URL-based policy smuggling...Increase the power of URL-based smuggling by making it (effectively)
compulsory in all cases and adapting a <salt><unique value><JSON-encoded
settings> structure. While the details still need to be worked out, the
potential for future expansion is there.
| jahoti |
2021-07-12 | merge jahoti into master | Wojtek Kosior |
2021-07-12 | Stop using the nonce consistently for a URL...Nonces are now randomly generated, either in the page (for non-HTTP(S) pages)
or by a background module which stores them by tab and frame IDs. In order to
support the increased variance in nonce-generating methods and allow them to
be loaded from the background, handle_page_actions is now invoked separately
according to (non-)blocking mechanism.
| jahoti |
2021-07-11 | Remove redundant nonce-based filtering in the script suppressor | jahoti |
2021-07-06 | show some settings of the current page in the popup | Wojtek Kosior |
2021-07-02 | move parsing of url with targets to misc.js | Wojtek Kosior |
2021-06-30 | refactor 3 miscellaneous fnctionalities to a their single own file | Wojtek Kosior |
2021-06-30 | emply an sh-based build system; make some changes to blocking | Wojtek Kosior |
2021-06-28 | Index two new files intended for the previous commit. | jahoti |
2021-06-28 | License script-blocking techniques from NoScript in machine-readable format....In-page blocking now works on Firefox, and JavaScript/data- URLs are properly
blocked to ensure no JavaScript leaks in through backdoors. Blocking of HTML/XML
data: urls should be refined (eventually) to align with current practice for
pages in general.
Also, script-blocking is now filtered by nonce, making it possible (albeit
perhaps not desirable) to inject scripts before the DOM is complete.
| jahoti |
2021-06-25 | gather all copyright info in 'copyright' file | Wojtek Kosior |
2021-06-18 | when possible inject CSP as http(s) header using webRequest instead of adding... | Wojtek Kosior |
2021-06-14 | change licenses | Wojtek Kosior |
2021-05-13 | utilize CSP for blocking | Wojtek Kosior |
2021-05-12 | use unique hashes when smuggling whitelist setting | Wojtek Kosior |
2021-05-12 | stop using js modules | Wojtek Kosior |
2021-05-10 | initial commit | Wojtek Kosior |