

Building on the work done in the past by IronFox and similar projects, we have created sandbox profiles for the Tor daemon and for Tor Browser itself. “We have also made some progress with sandboxing on macOS. Some of the sandboxing technology is now included in the Tor Browser for OS X, as well. Sandboxes can help prevent these exploits from giving attackers access to the underlying operating system and other apps on the targeted machine. Drive-by downloads and many other attack techniques use vulnerabilities in browsers to get control of victims’ machines.


Much of the malicious activity that targets average users is centered around the browser. For example, the container that the browser runs in does not have an IP address to leak, or a connection to the external network except via Tor.” “This is done by creating lightweight namespace based containers in which the Tor Browser components are run, with various restrictions imposed by the operating system. “On Linux the Tor Browser sandbox is centered around Linux namespaces along with seccomp-bpf, and attempts to reduce the attack surface available to adversaries to prevent exploits from succeeding, and to limit the capabilities of an attacker in the event that they do manage to compromise either the tor client instance or the browser itself,” the Tor Project said in a post. The Tor Project has been working on a sandbox for its browser, which is based on Mozilla Firefox, for some time. Sandboxes are meant to limit the damage that an exploit attempt against a given vulnerability can cause. Most of the major browsers have added sandboxes in recent years in an effort to defeat some of the more common exploitation techniques that attackers use. The Tor Project also is working on a sandbox mechanism for the browser on OS X. The newest release of the Tor browser for Linux now include a sandbox, which is designed to make it more difficult for attackers to exploit vulnerabilities.
