
Firefox Noscript plugin 10.1.5.9 trust a site. Note that I hit the large S for google.com and now it says trusted. Click the large clock and it will turn into a small clock, which means it is now permanent and will be retained when the browser closes.
Save Trusted Setting Permanently
For those who are complaining that they lost settings after restarting Firefox, when you first click the “Trusted” field, you’re only setting it temporarily. That’s when the clock icon is still big. Click it a second time, and the icon becomes smaller, and it’s permanent. It’s not very intuitive, but once I figured it out, all was well.
source

Firefox Noscript plugin 10.1.5.9 trust a site. Note that I hit the large S for google.com and now it says trusted. The large clock means it is temporary and will be removed when the browser closes.

Firefox Noscript plugin 10.1.5.9 trust a site. Note that I hit the large S for google.com and now it says trusted. Click the large clock and it will turn into a small clock, which means it is now permanent and will be retained when the browser closes.
Developer response
The clock iconBy default you set the TRUSTED preset as temporary (big clock icon displayed on the button). Just click the clock to make it fade and the preset become permanent.
“Temporary allow xyz.com” maps to clicking the TRUSTED preset on the xyz.com row.
“Allow xyz.com” (permanently) maps to clicking the clock-shaped icon onto the TRUSTED preset (which means “Temporary”), to disable it (and make the preset assignment “Permanent”)…
What about the “Match HTTPS only” green/red lock toggle? If green (locked), the toggle makes base domain entries (e.g. “..google.com”) match themselves and all their subdomains, but only if their protocol is HTTPS (and therefore the traffic encrypted and not easily tampered with). Otherwise, if red and unlocked, both HTTP and HTTPS match: this has bad security implications especially on “hostile” networks where injecting malicious scripts directly in the unencrypted traffic is relatively easy, but is unfortunately needed for some sites to work. NoScript tries to gives you the “smartest” default for each site, i.e. green if the page is already served on HTTPS, red otherwise. source
Thanx a lot for your investigations. That makes the old behaviour more clear,
Meanwhile noscript has more clear icons.
The U I needs a lot of work,, it should be intuitive. The dangers of scripts need to be explained to users by Noscripts. Each script that tries to run should have an explanation of exactly what it claims to do, or at least a web link to claims about their being criminal or not, or intrusive/manipulative or not. If every browser creator made a deal with the other companies, they could stop nosy, manipulative, criminal scripts overnight. Browser makers make money off letting the scum spy on people, take from people.
[Don: Hi Ralph. I do agree. Since running NoScript as default for all sites I am always amazed at the amount of detritus from these sites. What do they do and why are they running it? These scripts are intrusive at best and can be criminal at worst. NoScript allows you to reduce this risk and take some of this risk if you feel it necessary. Thanks for stopping by.