On 2014-06-30 22:33, Geoff Down wrote:
On Mon, Jun 30, 2014, at 10:15 PM, Bobby Brewster wrote:But how can the person's computer be identified since all that is seen isthe connection between the exit node and the destination target_website.com The point, surely, is that real time code injection should not bepossible since no-one can trace the connection from the exit node back tothe user.If the code is injected between the target_website.com and the exit node, the exit node will relay it faithfully back through the Tor network to the client. It's all just bytes to Tor.
This is presumably dependent on the TBB having a vulnerability. So, even if all users of target_website.com were considered evil and should be targeted, this could only happen if a) there was a 0-day for Firefox on which TBB is based or b) there is a known vulnerability for Firefox but certain users did not bother to update.
The injected code would only be able to discern the client's real IP if the malware was successfully deployed and that would require the TBB to be compromised.
Right? -- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk