[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Bruce Schneier's Guardian Article about N_S_A and Tor.



On 2014-06-30 22:33, Geoff Down wrote:
On Mon, Jun 30, 2014, at 10:15 PM, Bobby Brewster wrote:


But how can the person's computer be identified since all that is seen is
the connection between the exit node and the destination
target_website.com

The point, surely, is that real time code injection should not be
possible since no-one can trace the connection from the exit node back to
the user.


 If the code is injected between the target_website.com and the exit
 node, the exit node will relay it faithfully back through the Tor
 network to the client.
It's all just bytes to Tor.


This is presumably dependent on the TBB having a vulnerability. So, even if all users of target_website.com were considered evil and should be targeted, this could only happen if a) there was a 0-day for Firefox on which TBB is based or b) there is a known vulnerability for Firefox but certain users did not bother to update.

The injected code would only be able to discern the client's real IP if the malware was successfully deployed and that would require the TBB to be compromised.

Right?

--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk