Tor Browser Exposed: Anti-Privacy Implantation at Mass Scale

The combination of chaining the vulnerabilities described below allows a malicious exit node operator or global adversary to conduct a silent remote code execution attack on all platforms of the Tor…