[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #11096 [Applications/Tor Browser]: Randomize MAC address before start of Tor
#11096: Randomize MAC address before start of Tor
--------------------------------------+--------------------------
Reporter: csoghoian | Owner: tbb-team
Type: enhancement | Status: closed
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution: wontfix
Keywords: tbb-security | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+--------------------------
Changes (by gk):
* status: assigned => closed
* resolution: => wontfix
Comment:
I think I agree with the sentiment that randomizing the MAC address from
Tor Browser land won't work. We could even argue that this is not in Tor
Browser's threat model. One could use Tails for that, though.
We should rather try to bump up our sandbox capabilities, so that an
attacker can't get to the MAC address via an exploit in the browser.
That's for a different ticket, though.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11096#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs