On 12/17/2016 08:56 PM, Walter Dnes wrote:

   I'm running Pale Moon.  In an xterm, I did...

export SSLKEYLOGFILE=/dev/shm/sslkeylogfile.txt

...and launched Pale Moon manually from the commandline. nd visited a
couple of https sites.  I did get /dev/shm/sslkeylogfile.txt which
begins with the line...

# SSL/TLS secrets log file, generated by NSS

   Following that are a bunch of lines starting with...

CLIENT_RANDOM

...followed by a space, followed by 161 random hex-numeric characters
i.e. [0-9a-f].

   I also saw a line beginning with...

RSA

...followed by a space, followed by 113 random hex-numeric characters
i.e. [0-9a-f].

   If you plan to do this regularly, your program launcher will need to
launch bash scripts with seperate filenames for each profile.  Maybe
append date-time stamp to filenames to avoid multiple sessions
overwriting each other.


   As for privacy, there are the usual features, like...

* asking sites to not track (don't trust that)
* control of which sites to accept/refuse regular cookies, and 3rd-party
   cookies, from
* whether or not to clear browsing and download history
* private browsing session
random - I have always wondered why none of the "user respecting" forks nor mozilla have any serious efforts to thwart browser fingerprinting, private browsing session is simply a misnomer without it.

Reply via email to