On 12/10/17 10:15, Igor Mozolevsky wrote:
They are not "hypothetical characters," they are invented characters that are used in a threat model. But that's reframing the problem- a hypothetical threat model is very different to a real threat model.
This is a very real threat model. There are a lot of malicious Tor exit node operators, and a lot of FreeBSD users update their system over subversion. The only thing that the Tor node operator needs to do is to detect relevant requests and serve malware.
How is this not real? Yuri _______________________________________________ freebsd-security@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"