![]() TorInstances=$( mdfind 'kMDItemCopyright = "Tor Browser*" || kMDItemCFBundleIdentifier = "org.mozilla. Double click on it, then select TextEdit from the Open With options: It will open up the following file: From this point, you can move ahead to the section named Putting the Tor country codes into the text editor. This may help detect instances that have slipped through Restricted Software. Look up your Tor folder with the following address: Once you are inside the folder, locate the torrc file. I'm not sure if something like this is even necessary, but in case it helps, I whipped this EA together that should collect any instances of Tor Browser installed anywhere on the Mac, including the full path, even if the end user has renamed it to something else in the Finder. If you list the app in mdls (Spotlight) iI see that the CFBundleIdentifier is listed as " browser" (yes, with the space in it) So it seems its based on the Mozilla code, but rebranded. ![]() ![]() It seems the Tor developers are using the Firefox code as their basis for TorBrowser. The actual executable is listed as Firefox. ![]() I only know that the browser doesn't actually show itself as Tor in the process list, except for the tor.real process as has been noted, but that is only one component of the app. It is strange, because it should be seeing it and killing it, like it is for you. I honestly can't say why its not working for I don't have it (a Restricted Software item) set up on our JSS, so I can't really test it at the moment. ![]()
0 Comments
Leave a Reply. |