[prev in list] [next in list] [prev in thread] [next in thread]
List: tor-talk
Subject: Re: [tor-talk] Self-deleting scripts in http connections
From: Allen <allenpmd () gmail ! com>
Date: 2016-12-21 20:24:33
Message-ID: CAB7TAMmQ_5dOA-SDU+B7PaeDrX1zPU-8K3XiSSBOyCvM73oq0w () mail ! gmail ! com
[Download RAW message or body]
http://www.digitaltrends.com/computing/firefox-tor-vulnerability/
On Wed, Dec 21, 2016 at 3:09 PM, Joe Btfsplk <joebtfsplk@gmx.com> wrote:
>
>
> On 12/8/2016 7:10 AM, Jonathan Marquardt wrote:
>>
>>
>> Such an attacker could insert some JS or cookies etc. to track a user
>> around
>> the web or more dangerous attacks like stealing user data. The
>> possibilities
>> of JS are far-reaching. In the worst case scenario, JS can be used to
>> exploit
>> a user's device and gain priviliges within the OS. Such an attack has just
>> been discovered last month *on this mailing list right here.*
>
>
> Details? Missed that memo.
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic