[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Tor a Virus?



Janne Snabb writes:

> 5. Maybe someone with a black hat has made a kit containing some
> remote exploit tools combined with specially configured tor, which
> probably uses its own network (instead of connecting to the public
> network we are part of) and allows connecting to SMTP port. They could
> be running the exploit to install their custom configured tor. They
> could then use their tor network to launch other kinds of attacks or
> to spam. One of the victims with an infected computer could have
> contacted her preferred AV vendor who has then added tor to their
> virus signature files without bothering to figure out what tor really
> is (not malware).

Or the report to the AV vendor was less innocent.


-- 
Chris Palmer
Technology Manager, Electronic Frontier Foundation
415 436 9333 x124 (desk), 415 305 5842 (cell)

81C0 E11D CE73 4390 B6C7  3415 B286 CD8F 68E4 09CD

Attachment: pgpq2hsFtXYga.pgp
Description: PGP signature