[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Bruce Schneier's Guardian Article about N_S_A and Tor.

On Mon, Jun 30, 2014, at 10:15 PM, Bobby Brewster wrote:

> But how can the person's computer be identified since all that is seen is
> the connection between the exit node and the destination
> target_website.com
> The point, surely, is that real time code injection should not be
> possible since no-one can trace the connection from the exit node back to
> the user.

 If the code is injected between the target_website.com and the exit
 node, the exit node will relay it faithfully back through the Tor
 network to the client.
It's all just bytes to Tor.

> I am not saying that the user cannot be traced e.g. if he logs into his
> own webmail account via Tor; I am saying that the trace should not occur
> due to the Tor network. 

The trace doesn't take place through the Tor network: the malware placed
on the target person's computer can call home over the clearnet (this is
where Tails/Whonix/VMs come in as a second line of defense); or the
cookies injected can end up being sent to another site that the target
visits which helps link them to an identity or pseudonym (good cookie
hygiene is some small help).

http://www.fastmail.fm - Accessible with your email software
                          or over the web

tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to