[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: How are hackers breaking Tor and trojan users?



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Arrakis wrote:
> Foxyproxy+Polipo+Tor will not be immune.
> xB Machine and JanusVM will be immune to the attack.
> 
> Steve
(snip)

Sounds like plain-vanilla proxy circumvention to me. Old news. =:oD

- --
F. Fox
AAS, CompTIA A+/Network+/Security+
Owner of Tor node "kitsune"
http://fenrisfox.livejournal.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQIVAwUBSFAap+j8TXmm2ggwAQh+bw/+P6mOANdpPf/TqGi/OAV0Yj2S3Da+LTi8
VRpYEpzbVQFQGTT9ZmnOSjfWaVOdqBEL+vmG88+phvVva6U8Ppk1SQj0/a+3x2al
P9AnBPgxTfoRXH0o14gSasd9XjIXwUYZzYjO6wy25VntCLNV0aNT5kXPPo8dSm0n
x+49pRxkwemkpe+Cap43tbxtoal7GMmXbPbeh02eMM0nHLQ+o7jzinLKvPwG75kV
xXkU0XbKpFHnC/zcMNWdJXAn2QL9qsG8guQIo8tUZ1vFQURBr0WI/5FL3vNECiJ+
kHp1BVl5buhIjGeIdYlK+qPr6IiCRTyddr7TLwrEW2BTmZTfRXjcxSHTZqXbgHRg
+nkyIbsNJscHSIkslBn/8YgFahv0WT86hJ0bAUKXhwSwnqCzk4EcB84gOBBxhM4E
b4Qu7lHpoIrqhTOi84QppJRlUrge3VQ/0KHW75LYVk+9ZA0UzsKp7IoqOvUu5DlV
tMKsrcPWfwfik2fqMYEm7YBqWmlNGZgBJDTKVMMO3u8iQGuUAFKupvPcrwAPYM1i
bcZDhPeyfnRWnP5JL41GQJ6SaQHVU4eHPGKfPK9K85bqq/ld1Y1Ek925/s9zORPE
JiA2XDVb4M9oejlpOMLYmtWm6WJ7gVN4WTXphlTtcTld6bHi/B9prJXSzl7z1Sau
XtP6NB1c6lw=
=wNIe
-----END PGP SIGNATURE-----