aboutsummaryrefslogtreecommitdiff
path: root/changes/pathsel-BUGGY-a
blob: cad2af5c0d0c7f4ede421db3cbe5736d93594bcb (plain)
1
2
3
4
5
6
7
8
9
10
11
12
  o Security fixes:

    - Try to leak less information about what relays a client is
      choosing to a side-channel attacker.  Previously, a Tor client
      would stop iterating through the list of available relays as
      soon as it had chosen one, thus leaking information about which
      relays it picked for a circuit to a timing attack.  (Tor is
      likely to still leak information about which relays it has
      chosen for a circuit to other processes on the same computer,
      through e.g. which cache lines it loads while building the
      circuit.)