Stoutner - Redmine: Issueshttps://redmine.stoutner.com/https://redmine.stoutner.com/favicon.ico?16699090422024-03-26T00:07:25ZStoutner - Redmine
Redmine Privacy Browser PC - Feature #1184 (New): Add proxy supporthttps://redmine.stoutner.com/issues/11842024-03-26T00:07:25ZSoren Stoutnersoren@stoutner.com
<p>There is some documentation for this at:</p>
<p><a class="external" href="https://wiki.qt.io/QtWebEngine/Network">https://wiki.qt.io/QtWebEngine/Network</a></p> Privacy Cell - Feature #1177 (New): Detecting Silent SMS Attackshttps://redmine.stoutner.com/issues/11772024-03-02T20:58:24ZMark Weston
<p>Both the Android IMSI-Catcher Detector and SnoopSnitch projects have been abandoned:<br /><a class="external" href="https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector">https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector</a><br /><a class="external" href="https://github.com/srlabs/snoopsnitch">https://github.com/srlabs/snoopsnitch</a></p>
<p>As it stands, there are no Android apps to detect when your device has fallen victim to an IMSI Catcher / Stingray. Since this project is well developed and active, I am proposing incorporating some of the features from AIMISCD into this project. Would it be feasible to start with detecting silent SMS which is not as big of an undertaking as detecting an IMSI catcher?</p>
<p>This GPL 3.0 code will be helpful:<br /><a class="external" href="https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector/blob/development/AIMSICD/src/main/java/com/secupwn/aimsicd/smsdetection/SmsDetector.java">https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector/blob/development/AIMSICD/src/main/java/com/secupwn/aimsicd/smsdetection/SmsDetector.java</a></p> Privacy Browser PC - Feature #1161 (New): Prevent the sending of the referer headerhttps://redmine.stoutner.com/issues/11612024-01-31T21:48:20ZSoren Stoutnersoren@stoutner.com
<p>This would bring feature parity with Privacy Browser Android.</p> Privacy Cell - Bug #1158 (Feedback): random spurious backgrounded crasheshttps://redmine.stoutner.com/issues/11582024-01-23T20:40:42Zw tango
<p>remarkably useful app!</p>
<p>was running very reliably on Android 13 + OneUI 5.1 on Samsung SM-S908U (S22 Ultra) continuously for up to 30 days.</p>
<p>post-Android 14 + OneUI 6.0 [29nov2023-present], background service spuriously & randomly crashes, gracefully w/ notification, after a minmum of 1 day running AOK, typically after 2+ days running. only relaunch is required to recover. not Force Stop or even Clear Cache. kind of annoying, but not a total showstopper.</p> Privacy Browser PC - Feature #1137 (New): Figure out how Angelfish is implementing a Reader Modehttps://redmine.stoutner.com/issues/11372023-12-16T20:29:26ZSoren Stoutnersoren@stoutner.com
<p>It is fairly basic, but would still be a nice addition.</p> Privacy Browser PC - Feature #1125 (New): Look at Falkon's autotests to get ideas about autotests...https://redmine.stoutner.com/issues/11252023-11-25T19:45:02ZSoren Stoutnersoren@stoutner.com
<p><a class="external" href="https://salsa.debian.org/sorenstoutner/falkon/-/tree/master/autotests">https://salsa.debian.org/sorenstoutner/falkon/-/tree/master/autotests</a></p>
<p>These could also be good candidates for auto package tests in Debian.</p>
<p>Also, maybe:</p>
<p><a class="external" href="https://salsa.debian.org/sorenstoutner/falkon/-/tree/master/tests">https://salsa.debian.org/sorenstoutner/falkon/-/tree/master/tests</a></p> Privacy Cell - Feature #1117 (New): Indicate which SIM cards are default for Voice and Data.https://redmine.stoutner.com/issues/11172023-11-08T18:02:58Zandre rodier
<p>I have a dual SIM phone, and while the application seem to work, I don't know which card is used for the warnings I receive.<br />Can you add the SIM card name in the notifications, please?</p> Privacy Browser PC - Feature #1098 (New): Add a forward and back historyhttps://redmine.stoutner.com/issues/10982023-10-12T22:52:37ZSoren Stoutnersoren@stoutner.com
<p>This should be accessible under the forward and back actions on the navigation toolbar. It might also be nice to design a history dialog similar to that in Privacy Browser Android.</p> Privacy Browser PC - Feature #1079 (New): Allow dragging to reorder bookmarks in the toolbarhttps://redmine.stoutner.com/issues/10792023-09-07T19:12:26ZSoren Stoutnersoren@stoutner.com
<p>Konqueror doesn't allow this, but Falkon does.</p>
<p>Interestingly, it doesn't look like Falkon uses <code>QToolBar</code>, but rather builds the toolbar directly from <code>QWidget</code>.</p>
<p><a class="external" href="https://github.com/KDE/falkon/blob/master/src/lib/bookmarks/bookmarkstoolbar.h">https://github.com/KDE/falkon/blob/master/src/lib/bookmarks/bookmarkstoolbar.h</a></p>
<p><a class="external" href="https://github.com/KDE/falkon/blob/master/src/lib/bookmarks/bookmarkstoolbar.cpp">https://github.com/KDE/falkon/blob/master/src/lib/bookmarks/bookmarkstoolbar.cpp</a></p>
<p>Whether this is possible with QToolBar is a question to be investigated.</p> Privacy Browser PC - Feature #1078 (New): Add context menus to the bookmarks menuhttps://redmine.stoutner.com/issues/10782023-09-07T18:56:45ZSoren Stoutnersoren@stoutner.com
<p>Currently the context menus only work on the bookmarks toolbar.</p>
<p>Konqueror has them working on both (except that they killed the context menu on items in the bookmark menu that aren't bookmarks).</p>
<p>Using <code>setContextMenuPolicy(Qt::CustomContextMenu)</code> doesn't work because it is overwritten by <code>void KMenuMenuHandler::showContextMenu(QMenu *menu, const QPoint &pos)</code> in <code>kmenumenuhandler_p.cpp</code>.</p>
<p><a class="external" href="https://github.com/KDE/kxmlgui/blob/master/src/kmenumenuhandler_p.cpp">https://github.com/KDE/kxmlgui/blob/master/src/kmenumenuhandler_p.cpp</a></p>
<p>Konqueror may be able to work around this because they don't base their system directly on <code>KXmlGuiWindow</code>, but rather `KParts::MainWindow` and `KonqFrameContainerBase`.</p>
<p>They do this with <code>QMenu *KonqBookmarkMenu::contextMenu(QAction *action)</code> in <code>kbookmarkmenu.cpp</code>, which overrides the protected function in <code>KBookmarkMenu</code>.</p>
<p><a class="external" href="https://api.kde.org/frameworks/kbookmarks/html/kbookmarkmenu_8cpp_source.html">https://api.kde.org/frameworks/kbookmarks/html/kbookmarkmenu_8cpp_source.html</a></p> Privacy Browser PC - Feature #1016 (In Progress): Remove the separator between Refresh and Reload...https://redmine.stoutner.com/issues/10162023-06-09T21:08:35ZSoren Stoutnersoren@stoutner.com
<p>Currently there is a separator in the View menu between Refresh and Reload and Bypass Cache. This is because KDE's ui_standards.rc file doesn't currently have the option necessary to not insert it.</p>
<p>What is needed is to add <code><MergeLocal name="view_redisplay_merge"/></code> immediately after <code><Action name="view_redisplay"/></code>.</p> Privacy Browser PC - Feature #1007 (In Progress): Domain Settings are not applied when loading a ...https://redmine.stoutner.com/issues/10072023-05-11T06:02:31ZSoren Stoutnersoren@stoutner.com
<p>If you are on a website with domain settings applied and you open a link <strong>to the same domain</strong> in a new tab by using either Ctrl-click or Ctrl-Shift-click domain settings will not be applied in that tab.</p>
<p>However, if you open the new tab using the right-click menu with either "Open link in new tab" or "Open link in new background tab" then the domain settings will be appropriately applied.</p>
<p>If the link opens a different domain this does not manifest. I think this has to do with the current domain being passed to the new tab so that it doesn't think the domain is changing and, therefore, doesn't reapply domain settings so as to not wipe out on-the-fly settings. Somehow this is passed with Ctrl-clicks but not with the context menu.</p> Privacy Browser PC - Feature #1004 (In Progress): Add the option to launch Privacy Browser in a c...https://redmine.stoutner.com/issues/10042023-04-25T21:30:18ZSoren Stoutnersoren@stoutner.com
<p>This would be similar to how Nyxt does it.</p>
<p><a class="external" href="https://github.com/atlas-engineer/nyxt/blob/master/documents/README.org#run-nyxt-in-a-security-sandbox">https://github.com/atlas-engineer/nyxt/blob/master/documents/README.org#run-nyxt-in-a-security-sandbox</a></p> Privacy Cell - Feature #901 (New): Consider displaying APN informationhttps://redmine.stoutner.com/issues/9012022-09-08T22:52:35ZSoren Stoutnersoren@stoutner.com
<p><a class="external" href="https://developer.android.com/reference/android/telephony/data/ApnSetting">https://developer.android.com/reference/android/telephony/data/ApnSetting</a></p>
<p>This comes from <a class="external" href="https://developer.android.com/reference/android/telephony/PreciseDataConnectionState">https://developer.android.com/reference/android/telephony/PreciseDataConnectionState</a>, which can be acquired from <a class="external" href="https://developer.android.com/reference/android/telephony/PhoneStateListener#onPreciseDataConnectionStateChanged(android.telephony.PreciseDataConnectionState)">https://developer.android.com/reference/android/telephony/PhoneStateListener#onPreciseDataConnectionStateChanged(android.telephony.PreciseDataConnectionState)</a>.</p> Privacy Cell - Feature #892 (New): Display information about the cell phone spectrum in usehttps://redmine.stoutner.com/issues/8922022-08-20T19:08:53ZSoren Stoutnersoren@stoutner.com
<p>I am assuming there are Android APIs that expose this information.</p>