Opened 6 months ago

Closed 6 months ago

#29039 closed project (not a bug)

Security of host device and OS using Tor in Virtual Monitor

Reported by: JPyron Owned by:
Priority: Medium Milestone:
Component: Community/Tor Support Version: Tor: 0.3.5.7
Severity: Normal Keywords: security of host device and OS
Cc: Actual Points:
Parent ID: Points:
Reviewer: Sponsor:

Description

I use the Tor browser in a Virtual Monitor with a Linux Unbuntu OS. Is there any chance my host device, Firefox browser, or Windows 10 OS can be compromised?

Child Tickets

Change History (1)

comment:1 Changed 6 months ago by teor

Component: ObfuscationCommunity/Tor Support
Resolution: not a bug
Status: assignedclosed

Hi,

Virtual machine exploits exist. You should keep your software up-to-date, so that it's patched for known exploits.

That said, most people probably won't be the target of a new virtual machine exploit, they're pretty rare.

You might find this guide useful:
https://ssd.eff.org/en

If you have more questions, please use a Q&A site like Stack Exchange. Our bug tracker isn't set up to answer questions.
https://tor.stackexchange.com/

Note: See TracTickets for help on using tickets.