Feature #12179

Tor Browser hardened

Added by Anonymous 2017-01-26 13:40:55 . Updated 2017-01-27 09:39:48 .

Status:
Duplicate
Priority:
Normal
Assignee:
Category:
Target version:
Start date:
2017-01-26
Due date:
% Done:

0%

Feature Branch:
Type of work:
Discuss
Blueprint:

Starter:
Affected tool:
Deliverable for:

Description

Consider switching to Tor Browser Hardened for smaller attack surface.
Now that you are moving towards x64 there should be not much of a reason to hold back on it


Subtasks


Related issues

Is duplicate of Tails - Feature #7155: Build the browser with Address Sanitizer or SoftBound Rejected 2014-05-02

History

#1 Updated by intrigeri 2017-01-26 18:57:54

  • QA Check set to Info Needed

> Consider switching to Tor Browser Hardened for smaller attack surface.

Last time I checked, it was clearly not ready for production use yet, and some of the experiments being made on that branch had unclear impact (i.e. they could as well make some things worse in terms of security, while improving others, iirc).

Is it now documented as being ready for mass production usage?

#2 Updated by cypherpunks 2017-01-27 09:33:27

Not only is this a duplicate, but intrigeri is right. It can increase attack surface area and is ready for production use. In fact, there is discussion in Tor Project to rename the browser to -debug instead of -hardened because it is causing misunderstanding. The actual hardening features, like Selfrando, will eventually be moved down to alpha, and finally stable, when the time is right.

#3 Updated by intrigeri 2017-01-27 09:38:58

  • is duplicate of Feature #7155: Build the browser with Address Sanitizer or SoftBound added

#4 Updated by intrigeri 2017-01-27 09:39:48

  • Status changed from New to Duplicate

See Feature #7155.