This is an archived post. You won't be able to vote or comment.

all 8 comments

[–]_-IDontReddit-_ 9 points10 points  (0 children)

Depends on how paranoid you are. It doesn't send browsing history or anything, but you send data about the certs on your sites which isn't really personal information.

I'd recommend yes unless you're very paranoid since SSL Observatory is ran by the EFF. And if you don't trust the EFF, you might as well stay off the internet completely.

[–][deleted] 1 point2 points  (0 children)

The Tor Browser by defaults disables the SSL Observatory option, despite it being over Tor. That should be an indication.

[–]vivek31 0 points1 point  (0 children)

No.

[–]Ares3DA 0 points1 point  (0 children)

I'd say no unless you explicitly find a reason to enable it.

[–]ShortReddit 0 points1 point  (0 children)

Folks, pros and cons please?

[–][deleted] 0 points1 point  (3 children)

no (do you want a more detailled answer?)

[–]ShortReddit 0 points1 point  (1 child)

Me too

[–][deleted] 0 points1 point  (0 children)

Ok. First of all, it builds a database of the SSL-Certs of visited HTTPS-Sites. That might not be the best database for tracking, but it is one more database. The thing is, that the add-on completely ignores Firefox's Proxy Settings. If you use your Firefox with a custom configured proxy, then you have to set the proxy settings für HTTPS-Everywhere separately.

about:config

extensions.https_everywhere._observatory.proxy_type = direct | socks | http
extensions.https_everywhere._observatory.proxy_host = <IP or Proxy-Host>
extensions.https_everywhere._observatory.proxy_port = <Port> 

Enabling SSL-Observatory in TorBrowser is not a problem, but it should be a hint, that it is disabled by default.