Janne Snabb writes: > 5. Maybe someone with a black hat has made a kit containing some > remote exploit tools combined with specially configured tor, which > probably uses its own network (instead of connecting to the public > network we are part of) and allows connecting to SMTP port. They could > be running the exploit to install their custom configured tor. They > could then use their tor network to launch other kinds of attacks or > to spam. One of the victims with an infected computer could have > contacted her preferred AV vendor who has then added tor to their > virus signature files without bothering to figure out what tor really > is (not malware). Or the report to the AV vendor was less innocent. -- Chris Palmer Technology Manager, Electronic Frontier Foundation 415 436 9333 x124 (desk), 415 305 5842 (cell) 81C0 E11D CE73 4390 B6C7 3415 B286 CD8F 68E4 09CD
Attachment:
pgpq2hsFtXYga.pgp
Description: PGP signature