[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] TOR Browser safety practices



On Sat, 20 Jul 2019 19:07:09 -0700
npdflr <npdflr@xxxxxxxx> wrote:

> What is the worst case that could happen if a malicious script
> (Javascript, XHR, other) or a malicious cookie runs?

afaik javascript exploits are rare and you already have noscript
enabled which makes it more unlikely, also if there exist an exploit
then why would someone use it on very small percentage of internet
users? If Tor Browser is affected then probably firefox is also
affected, they would use it on the internet and not some intranet (Tor
network).

You are thinking too much!

~Notopygos
--
1C24 ED06 365A 6045 C128
A1C0 FB0E 5321 5307 6E7D

Attachment: pgprwe8kqyoHn.pgp
Description: OpenPGP digital signature

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk