Open Source Tor Browser Patches For Multiple Vulnerabilities Cybers Guards
The flaw, known as scheme flood or protocol flooding, uses custom protocol handlers in browsers to probe desktop computers for installed apps, profile users, and track them across browsers including Chrome, Firefox, Safari, and Tor. Scheme flood is an attack vector that allows an attacker to find programmes that a user has installed by using custom URL schemes (also known as deep linking, the functionality allows applications to register their own schemes for other applications to open them)....