<p>The vulnerabilities described below were identified during an external security audit by <a href="https://www.radicallyopensecurity.com/">Radically Open Security</a> and disclosed responsibly to our team. We are not aware of these attacks being used against Tails users until now.</p>
<p>These vulnerabilities can only be exploited by a powerful attacker who has already exploited another vulnerability to take control of an application in Tails.</p>
In Tails 6.11 or earlier, an attacker who has already taken control of an application in Tails could then exploit vulnerabilities in *Onion Circuits* and our *Tor Browser* wrapper that might lead to deanonymization.