![]() TorInstances=$( mdfind 'kMDItemCopyright = "Tor Browser*" || kMDItemCFBundleIdentifier = "org.mozilla. This may help detect instances that have slipped through Restricted Software. I'm not sure if something like this is even necessary, but in case it helps, I whipped this EA together that should collect any instances of Tor Browser installed anywhere on the Mac, including the full path, even if the end user has renamed it to something else in the Finder. If you list the app in mdls (Spotlight) iI see that the CFBundleIdentifier is listed as " browser" (yes, with the space in it) So it seems its based on the Mozilla code, but rebranded. ![]() It seems the Tor developers are using the Firefox code as their basis for TorBrowser. The actual executable is listed as Firefox. ![]() I only know that the browser doesn't actually show itself as Tor in the process list, except for the tor.real process as has been noted, but that is only one component of the app. It is strange, because it should be seeing it and killing it, like it is for you. Every Bisq node is a Tor hidden service by default. I honestly can't say why its not working for I don't have it (a Restricted Software item) set up on our JSS, so I can't really test it at the moment. Your data is stored locally on-disk, and is never sent to a central server.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |