BTC $95339.6651
ETH $1822.2569
XRP $2.2947
BNB $603.0705
SOL $149.2603
ADA $0.7087
DOGE $0.1786
TRX $0.2462
stETH $1821.3950
WBTC $95305.9801
SUI $3.5667
LINK $14.8665
AVAX $21.8650
USDS $1.0019
XLM $0.2798
LEO $9.0609
TON $3.2315
HBAR $0.1889
wstETH $2186.3920
BCH $370.4205
DOT $4.2300
LTC $86.5880
HYPE $18.9709
BGB $4.4072
WETH $1823.0138
BSC-USD $1.0000
XMR $274.7975
BTCB $94725.3283
USDE $0.9994
weETH $1935.4641
WBT $29.2760
PEPE $0.0000
PI $0.5861
APT $5.5455
DAI $0.9997
TAO $372.0354
OKB $51.9718
NEAR $2.5632
UNI $5.3425
ONDO $0.9547
TRUMP $13.7623
GT $22.1466
CBBTC $95337.9994
ICP $4.9903
CRO $0.0911
ETC $17.0363
AAVE $169.5077
BTC $95339.6651
ETH $1822.2569
XRP $2.2947
BNB $603.0705
SOL $149.2603
ADA $0.7087
DOGE $0.1786
TRX $0.2462
stETH $1821.3950
WBTC $95305.9801
SUI $3.5667
LINK $14.8665
AVAX $21.8650
USDS $1.0019
XLM $0.2798
LEO $9.0609
TON $3.2315
HBAR $0.1889
wstETH $2186.3920
BCH $370.4205
DOT $4.2300
LTC $86.5880
HYPE $18.9709
BGB $4.4072
WETH $1823.0138
BSC-USD $1.0000
XMR $274.7975
BTCB $94725.3283
USDE $0.9994
weETH $1935.4641
WBT $29.2760
PEPE $0.0000
PI $0.5861
APT $5.5455
DAI $0.9997
TAO $372.0354
OKB $51.9718
NEAR $2.5632
UNI $5.3425
ONDO $0.9547
TRUMP $13.7623
GT $22.1466
CBBTC $95337.9994
ICP $4.9903
CRO $0.0911
ETC $17.0363
AAVE $169.5077
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • The results of the security audit show that Tor Browser passed the tough test.

    In-depth analysis: what Tor security holes were found?

    The creators of Tor Browser, a popular tool for browsing the Internet anonymously, have made the results of a full security audit public. The main projects that were checked out were Tor Browser, OONI Probe, rdsys, BridgeDB, and Conjure. From November 2022 to April 2023, the review was done by experts from Cure53.

    Nine security holes were found during the scan. Two of these vulnerabilities were seriously flawed, one was thought to be moderately dangerous, and the other six were deemed minor. Ten technical flaws that were not directly related to security issues were also found. But it has been found that the Tor code follows the rules for safe programming.

    Most important weaknesses:

    1. The first rdsys vulnerability that could be dangerous: A weakness was found in the rdsys backend, which sends resources like proxy lists and download links to users. When trying to get to the resource registration handler, there wasn't enough authentication. This made it possible for the attacker to list his harmful resource and let users use it. By sending an HTTP request to the rdsys handler, the flaw could be taken advantage of.
    2. The second dangerous flaw in Tor Browser had to do with the fact that digital signatures weren't being checked when rdsys and BridgeDB loaded a list of bridges. Since this list is loaded before connecting to the Tor anonymous network, attackers could change what's on it by, say, interfering with the connection. This could mean that users connect through bridge nodes that have been hacked and are now controlled by the attacker.
    3. Medium severity vulnerability in rdsys: A weakness was found in the rdsys subsystem in the script for setting up the assembly. As long as the attacker had access to the server and could write to the temporary files directory, he could change his account from user nobody to user rdsys. To take advantage of the flaw, the executable file in the /tmp directory must be replaced. If an attacker gets access to the rdsys user account, they can change executable files that are run through rdsys.
    4. Low-Severity Vulnerabilities: Most of them were caused by using old libraries that had known vulnerabilities or the chance of denial of service. For example, Tor Browser could get around blocking JavaScript when the security level was set to the highest level. It also didn't limit file downloads and let information leak through the user's home page, which meant that users could be tracked between restarts.

    Everything that could go wrong has been fixed so far. Extra safety measures have also been put in place, such as authentication for all rdsys components and checking digital signatures when adding lists to the Tor Browser.

    Along with fixing 19 vulnerabilities, a new version of Tor Browser 13.0.1 was released. It was based on Firefox 115.4.0 ESR. Fixed security holes in Firefox branch 119 have been moved to Tor Browser 13.0.1 for Android.

    Author reign3d
    Can You Hire a Hitman on the Dark Web? Here’s What You Need to Know
    Comprehensive Guide on the Jobs You’ll Find on the Dark Web – How to Get a Job

    Comments 0

    Add comment