On 12/17/2016 08:56 PM, Walter Dnes wrote:
I'm running Pale Moon. In an xterm, I did...
export SSLKEYLOGFILE=/dev/shm/sslkeylogfile.txt
...and launched Pale Moon manually from the commandline. nd visited a
couple of https sites. I did get /dev/shm/sslkeylogfile.txt which
begins with the line...
# SSL/TLS secrets log file, generated by NSS
Following that are a bunch of lines starting with...
CLIENT_RANDOM
...followed by a space, followed by 161 random hex-numeric characters
i.e. [0-9a-f].
I also saw a line beginning with...
RSA
...followed by a space, followed by 113 random hex-numeric characters
i.e. [0-9a-f].
If you plan to do this regularly, your program launcher will need to
launch bash scripts with seperate filenames for each profile. Maybe
append date-time stamp to filenames to avoid multiple sessions
overwriting each other.
As for privacy, there are the usual features, like...
* asking sites to not track (don't trust that)
* control of which sites to accept/refuse regular cookies, and 3rd-party
cookies, from
* whether or not to clear browsing and download history
* private browsing session
random - I have always wondered why none of the "user respecting" forks
nor mozilla have any serious efforts to thwart browser fingerprinting,
private browsing session is simply a misnomer without it.