[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #5689 [Company]: tor-browser-2.2.35-9_en-US.exe	infected?
#5689: tor-browser-2.2.35-9_en-US.exe infected?
-------------------------+--------------------------------------------------
    Reporter:  taylorkh  |       Owner:  erinn                        
        Type:  defect    |      Status:  reopened                     
    Priority:  critical  |   Milestone:  TorBrowserBundle 2.2.x-stable
   Component:  Company   |     Version:                               
  Resolution:            |    Keywords:                               
      Parent:            |      Points:                               
Actualpoints:            |  
-------------------------+--------------------------------------------------
Changes (by mikeperry):
 * cc: ioerror, arma, phobos (added)
  * component:  Tor bundles/installation => Company
Comment:
 Wow, I don't know about you guys, but this sounds like the malware on our
 build machines is what got the update :). How did all of the AV vendors
 sync up so fast? Are they usually that responsive?
 And why did an independent build machine produce a clean build
 immediately, while they were still flagging our official bundles.
 I'm not sure I want to close this.. I'm still left with more questions
 than answers. Does anyone know any staff/contact points at AV companies?
 We should at least attempt some minimal fact checking...
-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5689#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs