[tor-talk] TOR Browser safety practices

Notopygos notopygos at disroot.org
Sun Jul 21 07:03:19 UTC 2019


On Sat, 20 Jul 2019 19:07:09 -0700
npdflr <npdflr at zoho.com> wrote:

> What is the worst case that could happen if a malicious script
> (Javascript, XHR, other) or a malicious cookie runs?

afaik javascript exploits are rare and you already have noscript
enabled which makes it more unlikely, also if there exist an exploit
then why would someone use it on very small percentage of internet
users? If Tor Browser is affected then probably firefox is also
affected, they would use it on the internet and not some intranet (Tor
network).

You are thinking too much!

~Notopygos
--
1C24 ED06 365A 6045 C128
A1C0 FB0E 5321 5307 6E7D
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20190721/02c41631/attachment.sig>


More information about the tor-talk mailing list