[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #20955 [Applications/Tor Browser]: Tor Browser memory hardening
#20955: Tor Browser memory hardening
--------------------------------------+--------------------------
Reporter: arthuredelstein | Owner: tbb-team
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: tbb-security | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+--------------------------
Comment (by cypherpunks):
I'm a bit weary about using a memory allocator from a research paper.
There are alternatives that are actively developed and regularly used in
production systems, like OpenBSD malloc and Copperhead malloc. They also
do not come with the risk of the authors not maintaining the source as
they move on to another research project. Personally, I would very
strongly recommend the Copperhead malloc, as it's an improvement over even
the OpenBSD malloc in quite a few ways, and has some very interesting
hardening techniques planned for the future.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20955#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs