[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: More Secure Tor Browsing Through A Virtual Machine in Ubuntu

Please excuse my extreme ignorance.

> Even if an attacker were to be able to gain
> command-line access through a vulnerability in a program such as
> Firefox, they still wouldn't be able to obtain the user's IP address,
> look at their file system, or gain access to any other
> personally-identifiable information.

Could this attacker create a Tor circuit specifying a malicious node as the entry node?

How is entropy gathered in virtual machines? Will it tell you if there is not enough entropy to support unpredictable routing and encryption? (Or is that even an issue at all with Tor?)