pathsel-BUGGY-a 573 B

123456789101112
  1. o Security fixes:
  2. - Try to leak less information about what relays a client is
  3. choosing to a side-channel attacker. Previously, a Tor client
  4. would stop iterating through the list of available relays as
  5. soon as it had chosen one, thus leaking information about which
  6. relays it picked for a circuit to a timing attack. (Tor is
  7. likely to still leak information about which relays it has
  8. chosen for a circuit to other processes on the same computer,
  9. through e.g. which cache lines it loads while building the
  10. circuit.)