Firefox 0day Reaction


SUBMITTED BY: Guest

DATE: Nov. 14, 2013, 9:19 p.m.

FORMAT: Text only

SIZE: 1.1 kB

HITS: 862

  1. http://krebsonsecurity.com/2013/08/firefox-zero-day-used-in-child-porn-hunt/
  2. “Ironically, all [the malicious code] does is perform a GET request to a new domain, which is hosted outside of the Tor network, while transferring the same UUID,” David said. “That way, whoever is running this exploit can match any Tor user to his true Internet address, and therefore track down the Tor user.”
  3. Two fixes:
  4. 1. Disable Javascript in Tor Browser. YOU SHOULD HAVE BEEN DOING THIS FROM THE GET-GO!
  5. 2. Get PORTAL: https://github.com/grugq/portal
  6. 2a. Install a new OS that supports Full Disk Encryption (such as Linux Mint 15) onto a trusted laptop
  7. 2b. Remove the wireless and bluetooth cards
  8. 2c. Install PORTAL on a Raspberry Pi
  9. 2d. Get at least 1 WiFi USB Adapter (or multiple! Dispose of them!) for the Pi
  10. 2e. Run an ethernet cable from your Pi to your new laptop
  11. If you're really concerned about security, do both. There are far more sinister ways they could have used this exploit to unmask Tor users.
  12. At the very least, turn Javascript the fuck off.

comments powered by Disqus