Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Tor/Mozilla still haven't gotten the FBI to reveal how their pulled of their most recent Tor attack have they (not the CMU one, but the kiddy-fiddlers one).

Many have put forth those users were using flash, plugins or were convinced to download and execute something, but we don't know do we? And until developers do, the Tor Browser bundle could have a vulnerability that could compromise its main purpose.



Firefox exploit similar to the 2013 attack[0]

The zerodium price list has Firefox 0day at $30k[1] a pop - compared to $100k+ (today ~$1M) for Chrome

The long term solution for Tor Browser is to build on Chromium + Containers/VM + Isolating proxy

[0] https://www.wired.com/2013/09/freedom-hosting-fbi/

[1] https://www.wired.com/2015/11/heres-a-spy-firms-price-list-f...


It wouldn't be particular hard to sandbox Tor Browser on Linux and use namespaces such that the browser itself has limited ability to fingerprint its host or learn its host's IP.


> The long term solution for Tor Browser is to build on Chromium + Containers/VM + Isolating proxy

Surely text-mode gopher would also be more secure? (Only half-joking)


> Surely text-mode gopher would also be more secure?

I guess early nineties, late 80ies network C code is wonderful for security! On the plus side it let's less to audit. And you rewrite it in a secure language.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: