[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #5689 [Company]: tor-browser-2.2.35-9_en-US.exe infected?



#5689: tor-browser-2.2.35-9_en-US.exe infected?
-------------------------+--------------------------------------------------
    Reporter:  taylorkh  |       Owner:  erinn                        
        Type:  defect    |      Status:  reopened                     
    Priority:  critical  |   Milestone:  TorBrowserBundle 2.2.x-stable
   Component:  Company   |     Version:                               
  Resolution:            |    Keywords:                               
      Parent:            |      Points:                               
Actualpoints:            |  
-------------------------+--------------------------------------------------
Changes (by mikeperry):

 * cc: ioerror, arma, phobos (added)
  * component:  Tor bundles/installation => Company


Comment:

 Wow, I don't know about you guys, but this sounds like the malware on our
 build machines is what got the update :). How did all of the AV vendors
 sync up so fast? Are they usually that responsive?

 And why did an independent build machine produce a clean build
 immediately, while they were still flagging our official bundles.

 I'm not sure I want to close this.. I'm still left with more questions
 than answers. Does anyone know any staff/contact points at AV companies?
 We should at least attempt some minimal fact checking...

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5689#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs