Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Tuesday September 11 2018, @12:18PM   Printer-friendly
from the land-of-tor dept.

A company that sells exploits to government agencies drops Tor Browser zero-day on Twitter after recent Tor Browser update renders exploit less valuable.

Zerodium, a company that buys and sells vulnerabilities in popular software, has published details today on Twitter about a zero-day vulnerability in the Tor Browser, a Firefox-based browser used by privacy-conscious users for navigating the web through the anonymity provided by the Tor network.

In a tweet, Zerodium said the vulnerability is a full bypass of the "Safest" security level of the NoScript extension that's included by default with all Tor Browser distributions.

NoScript is a browser extension that uses a whitelist approach to let the user decide from what domains the browser can execute JavaScript, Flash, Java, or Silverlight content. It is included with all Tor Browser distributions because it provides an extra layer of security for Tor Browser users.

Zerodium's Tor zero-day basically allows malicious code to run inside the Tor Browser by bypassing NoScript's script-blocking ability.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2, Interesting) by Anonymous Coward on Wednesday September 12 2018, @12:24AM (2 children)

    by Anonymous Coward on Wednesday September 12 2018, @12:24AM (#733410)

    For anyone using Tor who only now got the wakeup call: don't use Torbrowser for really sensitive matters. Use Tails [soylentnews.org] instead. If you get pwned by the government, there won't be anything on the machine to identify or incriminate you. As a bonus, using a one-size-fits-all platform helps with browser fingerprinting.

    Tails can be installed on a flash drive with a persistent, encrypted partition. Put it on a MicroSD card, keep it in an SD adapter. Should it become necessary, you can hide/throw away/swallow the MicroSD with ease and leave no trace of what you have been using your laptop for.

    Starting Score:    0  points
    Moderation   +2  
       Interesting=1, Informative=1, Total=2
    Extra 'Interesting' Modifier   0  

    Total Score:   2  
  • (Score: 2) by linuxrocks123 on Wednesday September 12 2018, @04:22AM (1 child)

    by linuxrocks123 (2557) on Wednesday September 12 2018, @04:22AM (#733482) Journal

    Swallowing the card may not be enough: https://petapixel.com/2016/06/13/swallowed-64gb-microsd-card/ [petapixel.com]

    • (Score: 0) by Anonymous Coward on Wednesday September 12 2018, @05:08AM

      by Anonymous Coward on Wednesday September 12 2018, @05:08AM (#733492)

      Swallowing is not "to get rid of it", just plausible deniability. If they don't know you had one in the first place, they will not come looking. But I'd wager it'd be hard to notice even in a cursory X-Ray. Those cards are fucking tiny.

      If you wanna be sneaky, use a double-layered belt and jam the card between the layers. There are probably more ways to hide a microSD on the spot.