Yes but you have to choose to view the original html or it doesn’t do anything. 
So, by default, users will not be automatically exploited. They have to get a 
bad email and then choose menu options for that one email to then be able to 
click on a link which then might have content…

This is why it was considered a “moderate” security issue. It isn’t a drive by 
exploit where you send mail to people and then something happens to them. They 
have to actively cooperate to be exploited. It is a bug, yes, but it isn’t as 
bad as was being painted the other day here.

Al

From: nb.linux nb.linux
Reply: tor-talk@lists.torproject.org tor-talk@lists.torproject.org
Date: January 27, 2014 at 10:56:17 AM
To: tor-talk@lists.torproject.org tor-talk@lists.torproject.org
Subject:  Re: [tor-talk] Thunderbird leak  
When I opened that email and set View/Message Body As/Original HTML, 
Torbirdy did not prevent the tab to load nor refuse to display the HTML. 
(Maybe this is intended, because Torbirdy only focuses on normal email 
accounts(?)) 
-- 
Al Billings
http://makehacklearn.org

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to