[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Warnings on the download page
Looks good so far. From my perspective, the biggest risks are:
1) Third-party client applications leaking the real IP address of the
user. This includes Java, Flash, media players, PDF viewers, Word
documents...anything that opens up an external application that doesn't
go through the proxy.
2) Persistent cookies. If a rogue Tor node injects a HTML response back to
the user containing an IFRAME for every major web site, and that user has
a stored cookie for one of those sites, it could lead to the identity of
the user being disclosed.
3) Web application hijacking. If a rogue Tor node watches for a specific
pattern, such as the "welcome!" message from a web application or web
mail portal, the Tor node could kick the user out and hijack their
session. This is especially dangerous for sites that SSL-protect the
authentication process, but leave the rest of the application unencrypted
(Yahoo, GMail, others?). Once a valid session has been obtained, the node
operator could send spam (web mail), impersonate the user, or just data
mine their messages and account settings for identifiable information.
On Thursday 08 March 2007 16:22, Roger Dingledine wrote:
> The current simplest advice I can give people is to remove all plugins:
> Do you have any suggestions on safe ways to back off from that?