[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #5689 [Company]: tor-browser-2.2.35-9_en-US.exe infected?
#5689: tor-browser-2.2.35-9_en-US.exe infected?
-------------------------+--------------------------------------------------
Reporter: taylorkh | Owner: erinn
Type: defect | Status: reopened
Priority: critical | Milestone: TorBrowserBundle 2.2.x-stable
Component: Company | Version:
Resolution: | Keywords:
Parent: | Points:
Actualpoints: |
-------------------------+--------------------------------------------------
Changes (by mikeperry):
* cc: ioerror, arma, phobos (added)
* component: Tor bundles/installation => Company
Comment:
Wow, I don't know about you guys, but this sounds like the malware on our
build machines is what got the update :). How did all of the AV vendors
sync up so fast? Are they usually that responsive?
And why did an independent build machine produce a clean build
immediately, while they were still flagging our official bundles.
I'm not sure I want to close this.. I'm still left with more questions
than answers. Does anyone know any staff/contact points at AV companies?
We should at least attempt some minimal fact checking...
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5689#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs