Feature #12179
Tor Browser hardened
0%
Description
Consider switching to Tor Browser Hardened for smaller attack surface.
Now that you are moving towards x64 there should be not much of a reason to hold back on it
Subtasks
Related issues
Is duplicate of Tails - |
Rejected | 2014-05-02 |
History
#1 Updated by intrigeri 2017-01-26 18:57:54
- QA Check set to Info Needed
> Consider switching to Tor Browser Hardened for smaller attack surface.
Last time I checked, it was clearly not ready for production use yet, and some of the experiments being made on that branch had unclear impact (i.e. they could as well make some things worse in terms of security, while improving others, iirc).
Is it now documented as being ready for mass production usage?
#2 Updated by cypherpunks 2017-01-27 09:33:27
Not only is this a duplicate, but intrigeri is right. It can increase attack surface area and is ready for production use. In fact, there is discussion in Tor Project to rename the browser to -debug instead of -hardened because it is causing misunderstanding. The actual hardening features, like Selfrando, will eventually be moved down to alpha, and finally stable, when the time is right.
#3 Updated by intrigeri 2017-01-27 09:38:58
- is duplicate of
Feature #7155: Build the browser with Address Sanitizer or SoftBound added