On 5/3/12 7:26 PM, unknown wrote:
On Wed, 2 May 2012 22:43:52 +
Robert Ransom rransom.8...@gmail.com wrote:
See
https://blog.torproject.org/blog/firefox-security-bug-proxy-bypass-current-tbbs
for the security advisory.
Robert Ransom
___
On Fri, 4 May 2012 07:27:35 +0200
Fabio Pietrosanti (naif) li...@infosecurity.ch wrote:
Any potential DNS-leakage can be prevented with iptables (Debian GNU/Linux
way):
Well, this can also be prevented if the starter of TBB would be a
binary/executable rather than a shell script, and
On Wed, 2 May 2012 22:43:52 +
Robert Ransom rransom.8...@gmail.com wrote:
See
https://blog.torproject.org/blog/firefox-security-bug-proxy-bypass-current-tbbs
for the security advisory.
Robert Ransom
___
tor-talk mailing list
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
See
https://blog.torproject.org/blog/firefox-security-bug-proxy-bypass-current-tbbs
for the security advisory.
I'm quite surprised that you do not inform TBB users via the usual
channel: via the default startpage in TBB (check.tpo) - even if
See
https://blog.torproject.org/blog/firefox-security-bug-proxy-bypass-current-tbbs
for the security advisory.
Robert Ransom
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk