In case you haven't noticed this through some other channel.
--Roger
----- Forwarded message from Roger Dingledine <arma(a)mit.edu> -----
Date: Tue, 29 Nov 2016 17:43:26 -0500
From: Roger Dingledine <arma(a)mit.edu>
To: tor-talk(a)lists.torproject.org
Subject: Re: [tor-talk] Javascript exploit
On Tue, Nov 29, 2016 at 09:55:23PM -0000, firstwatch(a)sigaint.org wrote:
> This is an Javascript exploit
Thanks. I pointed some folks on irc to this mail, and Daniel Veditz
(Mozilla Security Team) said "the Firefox team was sent a copy of that
this morning. We've found the bug being used and are working on a patch."
So it sounds like the immediate next step is that Mozilla finishes their
patch for it; then the step after that is a quick Tor Browser update. And
somewhere in there people will look at the bug and see whether they
think it really does apply to Tor Browser.
--Roger
--
tor-talk mailing list - tor-talk(a)lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
----- End forwarded message -----
Hi Mike (and other Tor Browser devs),
Thought you might be interested in this tor-dev thread about securing
Tor and Tor Browser against targeted RAM bit-flip attacks:
https://lists.torproject.org/pipermail/tor-dev/2016-November/011655.html
T
--
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
xmpp: teor at torproject dot org
------------------------------------------------------------------------
Hi all,
we are moving out meeting time to 19:00 UTC on Mondays due to the end of
DST. The place is still the same: the #tor-dev IRC channel on irc.oftc.net.
Thus, the next meeting will be on Monday 7, 19:00 UTC.
See you there,
Georg