Hello list, We know something about the selectors that could trigger Foxacid attacks, and we can record the data sent to a machine running Tor Browser Bundle. So has anyone set up a sitting duck to trigger and record the payload of the attack? Once the payload is known then Firefox could be patched, no? -Jonathan