[tor-bugs] #29039 [Community/Tor Support]: Security of host device and OS using Tor in Virtual Monitor
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Jan 10 01:49:53 UTC 2019
#29039: Security of host device and OS using Tor in Virtual Monitor
--------------------------------------------+------------------------------
Reporter: JPyron | Owner: (none)
Type: project | Status: closed
Priority: Medium | Milestone:
Component: Community/Tor Support | Version: Tor: 0.3.5.7
Severity: Normal | Resolution: not a bug
Keywords: security of host device and OS | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------------+------------------------------
Changes (by teor):
* status: assigned => closed
* resolution: => not a bug
* component: Obfuscation => Community/Tor Support
Comment:
Hi,
Virtual machine exploits exist. You should keep your software up-to-date,
so that it's patched for known exploits.
That said, most people probably won't be the target of a new virtual
machine exploit, they're pretty rare.
You might find this guide useful:
https://ssd.eff.org/en
If you have more questions, please use a Q&A site like Stack Exchange. Our
bug tracker isn't set up to answer questions.
https://tor.stackexchange.com/
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29039#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list