[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #29039 [Community/Tor Support]: Security of host device and OS using Tor in Virtual Monitor
#29039: Security of host device and OS using Tor in Virtual Monitor
--------------------------------------------+------------------------------
Reporter: JPyron | Owner: (none)
Type: project | Status: closed
Priority: Medium | Milestone:
Component: Community/Tor Support | Version: Tor: 0.3.5.7
Severity: Normal | Resolution: not a bug
Keywords: security of host device and OS | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------------+------------------------------
Changes (by teor):
* status: assigned => closed
* resolution: => not a bug
* component: Obfuscation => Community/Tor Support
Comment:
Hi,
Virtual machine exploits exist. You should keep your software up-to-date,
so that it's patched for known exploits.
That said, most people probably won't be the target of a new virtual
machine exploit, they're pretty rare.
You might find this guide useful:
https://ssd.eff.org/en
If you have more questions, please use a Q&A site like Stack Exchange. Our
bug tracker isn't set up to answer questions.
https://tor.stackexchange.com/
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29039#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs