The document outlines a policy framework for managing capabilities across different trust levels (DEFAULT, TRUSTED, UNTRUSTED) with specific capabilities listed for each. It includes settings for local configurations, such as debugging options and storage preferences, and indicates that the system is operating in a Tor Browser environment. Additionally, it details synchronization settings and user choices related to XSS protection.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
10 views3 pages
Noscript Data
The document outlines a policy framework for managing capabilities across different trust levels (DEFAULT, TRUSTED, UNTRUSTED) with specific capabilities listed for each. It includes settings for local configurations, such as debugging options and storage preferences, and indicates that the system is operating in a Tor Browser environment. Additionally, it details synchronization settings and user choices related to XSS protection.