Surprised more people do not clearly see how [badly] this could be
used as an attack vector. Tracking individuals by subtle transient
modulation etc. More appalling is that the Tor Browser is also
affected. Nothing should every be updated or changed unless the user
gives a command. External "plugin" updates could be trigged by apt or
something along those lines.

/Erik Adler
B9E0EB17993D8CADE8B44F2AEDC3869E8FA82FC8

Reply via email to