Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

And even with all that caution, holes have been found in Tor Browser in the past.

The fact is that software with such a huge attack surface shouldn't be the mode of interaction for Tor services.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: