[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

TCP stack attack?

Has anyone come across any TCP stack implementation vulnerability research? I am interested in reading about what has been tried, and what has not been tried as yet. At this point in my education it strikes me that the TCP stack on any Tor node could be altered to do malicious things, and no one would ever know, or be able to know.

Julie C.
GPG key FF4E2E70 available atÂhttp://keys.gnupg.net