- Pale Moon guru
- Posts: 21409
- Joined: Sun, 28 Aug 2011, 17:27
- Location: 58.5°N 15.5°E
Pale Moon isn't vulnerable
Pale Moon already set the granularity for the performance timers sufficiently coarse in Oct 2016 when it became clear that this could be used to perform hardware-timing based attacks and fingerprinting.
Even so, we will be adding some additional defense-in-depth changes to the upcoming version 27.7 to be absolutely sure there is no further room for any of these sorts of hardware-timing based attacks in the future.
Basilisk has been updated
Basilisk has been updated with a release (2018.01.05) to mitigate these timing attacks.
It has been patched to make the performance timers sufficiently coarse to make them unusable for these kinds of attacks. This patch was already slated for Basilisk, but was now given high priority.
After updating Basilisk you should be fully protected from any potential exploits based on these CPU flaws. We'll continue to keep a close eye on developments in other browsers and update the developing platform as-necessary.
"If you want to build a better world for yourself, you have to be willing to build one for everybody." -- Coyote Osborne
Who is online
Users browsing this forum: Blogtrotter [RSS], Google [Bot], Google Feedfetcher [RSS], jdpls and 43 guests