Why TOR Operators SHOULD always sniff their exit traffic...

Kristian Köhntopp kris at xn--khntopp-90a.de
Fri Jun 10 06:59:21 UTC 2005


On Wednesday 08 June 2005 21:51, tor wrote:
> Of particular interest is the increasing
> sophistication of automated worm-based attacks. He cites the
> developing W32.spybot.KEG
> worm -- once inside a network it scans for several
> vulnerabilities and reports its findings via IRC. 

And Sober variants routinely use JAP to fetch updates.

Kristian



More information about the tor-talk mailing list