> On Sep 19, 2022, at 2:21 PM, jvoisin via Tails-dev wrote:
>
>>> Has anyone looked into adding -D_FORTIFY_SOURCE=3 to some
>>> It's unclear how much the performance impact is; probably the only way to
>>> know is to try it.
>
> I'd argue that it's also unclear what security benefits it woul
Hi,
jvoisin (2022-09-19):
> Do you have a link to the bug you opened intrigeri?
https://bugs.debian.org/1020275
Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, se
>> Has anyone looked into adding -D_FORTIFY_SOURCE=3 to some
>> It's unclear how much the performance impact is; probably the only way to
>> know is to try it.
I'd argue that it's also unclear what security benefits it would bring
to a web-browser :P
But having it enabled in Debian by default wo
Hi,
David A. Wheeler (2022-09-18):
> Has anyone looked into adding -D_FORTIFY_SOURCE=3 to some
> applications that directly interact with data from the Internet,
> such as t eh , web browser or parts of the Tor implementation?
I did not, thanks for the pointer!
I've just suggested the Tor Browse
Has anyone looked into adding -D_FORTIFY_SOURCE=3 to some applications that
directly interact with data from the Internet, such as t eh , web browser or
parts of the Tor implementation?
More info: "GCC's new fortification level: The gains and costs"
https://developers.redhat.com/articles/2022/09