Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Posted Aug 5, 2013 23:29 UTC (Mon) by bjacob (guest, #58566)Parent article: Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Posted Aug 5, 2013 23:36 UTC (Mon)
by bjacob (guest, #58566)
[Link] (9 responses)
http://www.mozilla.org/security/announce/2013/mfsa2013-53...
So was Torbrowser using an *unsupported* Firefox release until now ?! That seems to defeat the point of a would-be anonymizing browser.
Posted Aug 5, 2013 23:49 UTC (Mon)
by JoeBuck (subscriber, #2330)
[Link] (2 responses)
Posted Aug 5, 2013 23:53 UTC (Mon)
by k8to (guest, #15413)
[Link] (1 responses)
Posted Aug 6, 2013 17:54 UTC (Tue)
by rahvin (guest, #16953)
[Link]
Posted Aug 6, 2013 0:53 UTC (Tue)
by cesarb (subscriber, #6266)
[Link] (1 responses)
No.
https://blog.torproject.org/blog/tor-security-advisory-ol...
If that blog post says the truth (and I have no reason to doubt it), and I am reading it correctly, a fixed version had already been released more than a month ago.
Posted Aug 6, 2013 1:10 UTC (Tue)
by bjacob (guest, #58566)
[Link]
Posted Aug 6, 2013 6:08 UTC (Tue)
by gmaxwell (guest, #30048)
[Link] (3 responses)
See also: https://www.torproject.org/projects/torbrowser/design/
Posted Aug 6, 2013 6:51 UTC (Tue)
by pabs (subscriber, #43278)
[Link] (2 responses)
Posted Aug 6, 2013 9:53 UTC (Tue)
by tialaramex (subscriber, #21167)
[Link] (1 responses)
It's like password masking, using rot13 on the stored password doesn't make it difficult for bad guys to find the original password but it means someone who happens to glance at the config file is much less likely to come away with "MoonMoonForPresident" seared into their memory. Or think of it like the lock on a typical bathroom door. Can I open the lock from the "wrong" side with the tools in my pocket? Yes I can. But people don't, because they don't want to walk in someone using the toilet, the feeble lock is a prompt to remind us of a social convention and nothing more.
TOR is a big deal, to get any benefit users have to understand what it is and is not doing, and what that means for how they use a browser. Just labelling it "Super private mode" would be false advertising. Not to mention that then obviously TOR will be incredibly slow for everyone so they'll presumably switch it back off again and pronounce the whole thing a "waste of time".
Posted Aug 6, 2013 10:01 UTC (Tue)
by pabs (subscriber, #43278)
[Link]
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers are going to focus on whatever version Tor bundles, since non-expert Tor users are going to use the setup that makes it easy.
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
Attackers wield Firefox exploit to uncloak anonymous Tor users (ars technica)
