[tor-bugs] #29039 [Community/Tor Support]: Security of host device and OS using Tor in Virtual Monitor

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Jan 10 01:49:53 UTC 2019


#29039: Security of host device and OS using Tor in Virtual Monitor
--------------------------------------------+------------------------------
 Reporter:  JPyron                          |          Owner:  (none)
     Type:  project                         |         Status:  closed
 Priority:  Medium                          |      Milestone:
Component:  Community/Tor Support           |        Version:  Tor: 0.3.5.7
 Severity:  Normal                          |     Resolution:  not a bug
 Keywords:  security of host device and OS  |  Actual Points:
Parent ID:                                  |         Points:
 Reviewer:                                  |        Sponsor:
--------------------------------------------+------------------------------
Changes (by teor):

 * status:  assigned => closed
 * resolution:   => not a bug
 * component:  Obfuscation => Community/Tor Support


Comment:

 Hi,

 Virtual machine exploits exist. You should keep your software up-to-date,
 so that it's patched for known exploits.

 That said, most people probably won't be the target of a new virtual
 machine exploit, they're pretty rare.

 You might find this guide useful:
 https://ssd.eff.org/en

 If you have more questions, please use a Q&A site like Stack Exchange. Our
 bug tracker isn't set up to answer questions.
 https://tor.stackexchange.com/

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29039#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list