[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: How are hackers breaking Tor and trojan users?
You're making assumptions. I can't reveal the details of the talk,
but the tor developers have been informed of this problem for a
long time. I understand you're excitement though, I'm anxious too.
krishna e bera wrote:
You allege there is an exploitable flaw in current Tor versions
and have not informed Tor developers of details yet??
I would hope DefCon does not accept presenters having such ethics.
On Tue, Jun 10, 2008 at 12:50:10PM -0500, Arrakis wrote:
Yes, it can be done.
If the talk is accepted at DefCon, it will be demonstrated live.
I read that hackers are breaking Tor and turning into a trojan/rootkit? Is
this possible? How can they do this?
In post: http://www.wilderssecurity.com/showpost.php?p=1257878&postcount=722