[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

How are hackers breaking Tor and trojan users?



I read that hackers are breaking Tor and turning into a trojan/rootkit?  Is this possible?  How can they do this?

In post: http://www.wilderssecurity.com/showpost.php?p=1257878&postcount=722
says XeroBank:

I saw something about a Tor exploit talk being planned for Defcon. I'll assume that's where the s%*t is scheduled to hit the fan?
The one scheduled so far isn't going to be anything I don't think. I have serious doubts, considering the wording. Ours, if accepted, will truly unmask tor users and turn tor into a trojan/rootkit.
 
Is this XeroBank spreading fear to Tor without cause?  Or did hackers break Tor and create it a Trojan / Rootkit?

I see also JanusVM developer are working for XeroBank:
http://xerobank.com/team.php

Is JanusVM not being maintained because of XeroBank taking over?  It is dead since 2007.  They say download removed for Debian, but keep donations request and link to current Oct-19-2007:
http://www.janusvm.com/download.html

How can Tor become Trojan / Rootkit, this seems not possible?  How are hackers allowed to break user computers and not be illegal?  Why is JanusVM working for XeroBank?  Is there a safe Tor Virtual Machine to use?

I have many questions.  Thank you!