{"id":49637,"date":"2014-12-19T14:47:44","date_gmt":"2014-12-19T19:47:44","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser-the-tor-blog\/"},"modified":"2014-12-19T14:47:44","modified_gmt":"2014-12-19T19:47:44","slug":"tor-browser-the-tor-blog","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/tor-browser-the-tor-blog\/","title":{"rendered":"tor browser | The Tor Blog"},"content":{"rendered":"<p><p>    In May, the Open    Technology Fund commissioned iSEC Partners to study    current and future hardening options for the Tor Browser. The    Open Technology Fund is the primary funder of Tor Browser    development, and it commissions security analysis and review    for all of the projects that it funds as a standard practice.    We worked with iSEC to define the scope of the engagement to    focus on the following six main areas:  <\/p>\n<p>        The     complete report is available in the iSEC publications    github repo. All tickets related to the report can be found    using the     tbb-isec-report keyword. General Tor Browser security    tickets can be found using the     tbb-security keyword.  <\/p>\n<p>    The report had the following high-level findings and    recommendations.  <\/p>\n<p>                Due to our use of cross-compilation and non-standard        toolchains in         our reproducible build system, several hardening        features have ended up disabled. We have known about the        Windows issues prior to this report, and should have a fix        for them soon. However, the MacOS issues are news to us,        and appear to require that we build 64 bit versions of the        Tor Browser for full support. The parent ticket for all        basic hardening issues in Tor Browser is bug        #10065.      <\/p>\n<p>                iSEC recommended that we find a sponsor to fund a Pwn2Own reward for bugs        specific to Tor Browser in a semi-hardened configuration.        We are very interested in this idea and would love to talk        with anyone willing to sponsor us in this competition, but        we're not yet certain that our hardening options will have        stabilized with enough lead time for the 2015 contest next        March.      <\/p>\n<p>                The Microsoft        Enhanced Mitigation Experience Toolkit is an optional        toolkit that Windows users can run to further harden Tor        Browser against exploitation. We've created bug        #12820 for this analysis.      <\/p>\n<p>                PartitionAlloc is a memory allocator designed by Google        specifically to mitigate common heap-based vulnerabilities        by hardening free lists, creating partitioned allocation        regions, and using guard pages to protect metadata and        partitions. Its basic hardening features can be picked up        by using it as a simple malloc replacement library (as        ctmalloc). Bug        #10281 tracks this work.      <\/p>\n<p>                The iSEC vulnerability review found that the overwhelming        majority of vulnerabilities to date in Firefox were        use-after-free, followed closely by general heap        corruption. In order to mitigate these vulnerabilities, we        would need to make use of the heap partitioning features of        PartitionAlloc to actually ensure that allocations are        partitioned (for example, by using the existing tags from        Firefox's about:memory). We will        also investigate enabling assertions in limited areas of        the codebase, such as the refcounting system, the JIT and        the Javascript engine.      <\/p>\n<p>    A large portion of the report was also focused on analyzing    historical Firefox vulnerability data and other sources of    large vulnerability surface for a planned \"Security Slider\" UI    in Tor Browser.  <\/p>\n<p>    The Security Slider was first suggested by Roger Dingledine as    a way to make it easy for users to trade off between    functionality and security, gradually disabling features ranked    by both vulnerability count and web prevalence\/usability    impact.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<br \/>\n<a target=\"_blank\" href=\"https:\/\/blog.torproject.org\/category\/tags\/tor-browser\" title=\"tor browser | The Tor Blog\">tor browser | The Tor Blog<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In May, the Open Technology Fund commissioned iSEC Partners to study current and future hardening options for the Tor Browser. The Open Technology Fund is the primary funder of Tor Browser development, and it commissions security analysis and review for all of the projects that it funds as a standard practice. We worked with iSEC to define the scope of the engagement to focus on the following six main areas: The complete report is available in the iSEC publications github repo.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/tor-browser-the-tor-blog\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-49637","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/49637"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=49637"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/49637\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=49637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=49637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=49637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}