BTC $104925.2538
ETH $2492.1534
XRP $2.1865
BNB $649.3462
SOL $152.4818
DOGE $0.1855
TRX $0.2783
ADA $0.6694
stETH $2488.9105
WBTC $104867.6828
HYPE $34.0726
SUI $3.2841
wstETH $3000.8532
LINK $14.0245
AVAX $20.6518
USDS $0.9982
LEO $9.0733
XLM $0.2657
BCH $406.8060
TON $3.1963
HBAR $0.1689
LTC $88.3156
WETH $2491.6922
weETH $2663.7251
DOT $4.0267
XMR $325.3966
BSC-USD $0.9989
BGB $4.6675
BTCB $104866.5844
WBT $31.4499
USDE $1.0012
PEPE $0.0000
PI $0.6261
AAVE $253.6203
UNI $6.1751
sUSDe $1.1773
TAO $374.9828
DAI $0.9989
OKB $51.8888
APT $4.7571
NEAR $2.4129
CRO $0.0975
CBBTC $104966.3037
ICP $5.0311
ONDO $0.8302
ETC $17.1878
JITOSOL $183.9665
BTC $104925.2538
ETH $2492.1534
XRP $2.1865
BNB $649.3462
SOL $152.4818
DOGE $0.1855
TRX $0.2783
ADA $0.6694
stETH $2488.9105
WBTC $104867.6828
HYPE $34.0726
SUI $3.2841
wstETH $3000.8532
LINK $14.0245
AVAX $20.6518
USDS $0.9982
LEO $9.0733
XLM $0.2657
BCH $406.8060
TON $3.1963
HBAR $0.1689
LTC $88.3156
WETH $2491.6922
weETH $2663.7251
DOT $4.0267
XMR $325.3966
BSC-USD $0.9989
BGB $4.6675
BTCB $104866.5844
WBT $31.4499
USDE $1.0012
PEPE $0.0000
PI $0.6261
AAVE $253.6203
UNI $6.1751
sUSDe $1.1773
TAO $374.9828
DAI $0.9989
OKB $51.8888
APT $4.7571
NEAR $2.4129
CRO $0.0975
CBBTC $104966.3037
ICP $5.0311
ONDO $0.8302
ETC $17.1878
JITOSOL $183.9665
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • The results of the security audit show that Tor Browser passed the tough test.

    In-depth analysis: what Tor security holes were found?

    The creators of Tor Browser, a popular tool for browsing the Internet anonymously, have made the results of a full security audit public. The main projects that were checked out were Tor Browser, OONI Probe, rdsys, BridgeDB, and Conjure. From November 2022 to April 2023, the review was done by experts from Cure53.

    Nine security holes were found during the scan. Two of these vulnerabilities were seriously flawed, one was thought to be moderately dangerous, and the other six were deemed minor. Ten technical flaws that were not directly related to security issues were also found. But it has been found that the Tor code follows the rules for safe programming.

    Most important weaknesses:

    1. The first rdsys vulnerability that could be dangerous: A weakness was found in the rdsys backend, which sends resources like proxy lists and download links to users. When trying to get to the resource registration handler, there wasn't enough authentication. This made it possible for the attacker to list his harmful resource and let users use it. By sending an HTTP request to the rdsys handler, the flaw could be taken advantage of.
    2. The second dangerous flaw in Tor Browser had to do with the fact that digital signatures weren't being checked when rdsys and BridgeDB loaded a list of bridges. Since this list is loaded before connecting to the Tor anonymous network, attackers could change what's on it by, say, interfering with the connection. This could mean that users connect through bridge nodes that have been hacked and are now controlled by the attacker.
    3. Medium severity vulnerability in rdsys: A weakness was found in the rdsys subsystem in the script for setting up the assembly. As long as the attacker had access to the server and could write to the temporary files directory, he could change his account from user nobody to user rdsys. To take advantage of the flaw, the executable file in the /tmp directory must be replaced. If an attacker gets access to the rdsys user account, they can change executable files that are run through rdsys.
    4. Low-Severity Vulnerabilities: Most of them were caused by using old libraries that had known vulnerabilities or the chance of denial of service. For example, Tor Browser could get around blocking JavaScript when the security level was set to the highest level. It also didn't limit file downloads and let information leak through the user's home page, which meant that users could be tracked between restarts.

    Everything that could go wrong has been fixed so far. Extra safety measures have also been put in place, such as authentication for all rdsys components and checking digital signatures when adding lists to the Tor Browser.

    Along with fixing 19 vulnerabilities, a new version of Tor Browser 13.0.1 was released. It was based on Firefox 115.4.0 ESR. Fixed security holes in Firefox branch 119 have been moved to Tor Browser 13.0.1 for Android.

    Author reign3d
    Can You Hire a Hitman on the Dark Web? Here’s What You Need to Know
    Comprehensive Guide on the Jobs You’ll Find on the Dark Web – How to Get a Job

    Comments 0

    Add comment