Skip to content

Labels

Prioritized labels 0

Drag to reorder prioritized labels and change their relative priority.

Labels 142

  • S134-O1
    The Tor Project
    Issues that fit into objective 1 of Sponsor 134: Localize existing tools and support documentation so that human rights defenders in key areas can more easily use Tor.
  • S134-O2
    The Tor Project
    Issues that fit into objective 2 of Sponsor 134: Connect target audiences with resources to use Tor in their language.
  • S134-O3
    The Tor Project
    Issues that fit into objective 3 of Sponsor 134: Educate IRI and allies on new Tor resources.
  • S61-O1-Maybe - FINISHED
    The Tor Project
    Maybe a ticket to add to Sponsor 61 - Objective 1
  • S61-O2-Maybe - FINISHED
    The Tor Project
    Maybe a ticket to add to Sponsor 61 - Objective 2
  • S61-O3-Maybe - FINISHED
    The Tor Project
    Maybe a ticket to add to Sponsor 61 - Objective 3
  • S61-O4-Maybe - FINISHED
    The Tor Project
    Maybe a ticket to add to Sponsor 61 - Objective 4
  • S9-O1
    The Tor Project
    Sponsor 9 - Goal 1: Grow relationships between partners in LATAM and East Africa and build community in MENA
  • S9-O2
    The Tor Project
    Sponsor 9 - Goal 2: Continue usability research and improve partner support
  • S9-O3
    The Tor Project
    Sponsor 9 - Goal 3: Increase capacity to meet user support needs
  • S9-O4
    The Tor Project
    Sponsor 9 - Goal 4: Improve localization of tools and materials into target languages
  • S96-maybe-O1
    The Tor Project
    Sponsor 96 Objective 1
  • S96-maybe-O2
    The Tor Project
    Sponsor 96 Objective 2
  • S96-maybe-O3
    The Tor Project
    Sponsor 96 Objective 3
  • S96-maybe-O4
    The Tor Project
    Sponsor 96 Objective 4
  • Security
    The Tor Project
  • Severitycritical
    The Tor Project
    Critical vulnerability with immediate risk to users or infrastructure. Likely to be actively exploitable, with widespread or severe impact such as remote code execution, authentication bypass, or full data exfiltration. Requires immediate response and coordination.
  • Severityhigh
    The Tor Project
    Serious security vulnerability that could lead to user harm, data exposure, or significant system compromise. Often remotely exploitable, affects default configurations or untrusted inputs, and has a clear or demonstrated impact. Requires prioritization and typically must be addressed before major releases or external disclosures.
  • Severitylow
    The Tor Project
    Minor security concern with limited impact or exploitability. Might involve poor security hygiene, minor information leakage, or issues only exploitable in highly constrained, non-default, or theoretical scenarios. Does not require immediate attention but should be tracked and addressed as part of ongoing hardening or cleanup.
  • Severitymedium
    The Tor Project
    Moderate security risk with potential for user impact or system compromise in specific conditions. Exploitable under certain configurations, by authenticated users, or with user interaction. May require coordination to fix but is not actively being exploited or affecting critical paths. Should be addressed in the near term.