[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Tor a Virus?

Janne Snabb writes:

> 5. Maybe someone with a black hat has made a kit containing some
> remote exploit tools combined with specially configured tor, which
> probably uses its own network (instead of connecting to the public
> network we are part of) and allows connecting to SMTP port. They could
> be running the exploit to install their custom configured tor. They
> could then use their tor network to launch other kinds of attacks or
> to spam. One of the victims with an infected computer could have
> contacted her preferred AV vendor who has then added tor to their
> virus signature files without bothering to figure out what tor really
> is (not malware).

Or the report to the AV vendor was less innocent.

Chris Palmer
Technology Manager, Electronic Frontier Foundation
415 436 9333 x124 (desk), 415 305 5842 (cell)

81C0 E11D CE73 4390 B6C7  3415 B286 CD8F 68E4 09CD

Attachment: pgpq2hsFtXYga.pgp
Description: PGP signature