<font size="4">I read that hackers are breaking Tor and turning into a trojan/rootkit? Is this possible? How can they do this?<br><br>In post: <a href="http://www.wilderssecurity.com/showpost.php?p=1257878&postcount=722">http://www.wilderssecurity.com/showpost.php?p=1257878&postcount=722</a><br>
says XeroBank:<br><br></font><blockquote style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;" class="gmail_quote"><div style="margin-left: 40px;"><i>
I saw something about a Tor exploit talk being planned for Defcon. I'll
assume that's where the s%*t is scheduled to hit the fan? </i>
<br>
The one scheduled so far isn't going to be anything I don't think. I
have serious doubts, considering the wording. Ours, if accepted, will
truly unmask tor users and turn tor into a trojan/rootkit.</div></blockquote><div> <br><font size="4">Is this XeroBank spreading fear to Tor without cause? Or did hackers break Tor and create it a Trojan / Rootkit?<br><br>
I see also JanusVM developer are working for XeroBank:<br><a href="http://xerobank.com/team.php">http://xerobank.com/team.php</a><br><br>Is JanusVM not being maintained because of XeroBank taking over? It is dead since 2007. They say download removed for Debian, but keep donations request and link to current Oct-19-2007:<br>
<a href="http://www.janusvm.com/download.html">http://www.janusvm.com/download.html</a><br><br>How can Tor become Trojan / Rootkit, this seems not possible? How are hackers allowed to break user computers and not be illegal? Why is JanusVM working for XeroBank? Is there a safe Tor Virtual Machine to use?<br>
<br>I have many questions. Thank you!<br></font></div>