[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
To sniff the real data
Maybe somebody already had a look on this problem?
I´d like to know where and how to put in wich packetlogger
to get as close as possible to the border of encryption at
my user computer side of Tor, to watch exactly what´s going
in and out (not only what´s visible in the browser).
My firewall packetlogger only takes the already encrypted
stuff that looks like random garbage, thus it are a little
to late to see the actual content of it.
In my theory, the possibility may be that if someone running
running an exit node (or even a middle or entry node?) and
tamper with it, this may be an firewall free entry into the
user computer to hack it or do what ever whitout be stopped
by the user´s firewall.
What is your opinion about this?
--
http://www.fastmail.fm - IMAP accessible web-mail