How are hackers breaking Tor and trojan users?

MadAtTorHackers madathackers at gmail.com
Tue Jun 10 09:38:42 UTC 2008


I read that hackers are breaking Tor and turning into a trojan/rootkit?  Is
this possible?  How can they do this?

In post: http://www.wilderssecurity.com/showpost.php?p=1257878&postcount=722
says XeroBank:

* I saw something about a Tor exploit talk being planned for Defcon. I'll
> assume that's where the s%*t is scheduled to hit the fan? *
> The one scheduled so far isn't going to be anything I don't think. I have
> serious doubts, considering the wording. Ours, if accepted, will truly
> unmask tor users and turn tor into a trojan/rootkit.
>

Is this XeroBank spreading fear to Tor without cause?  Or did hackers break
Tor and create it a Trojan / Rootkit?

I see also JanusVM developer are working for XeroBank:
http://xerobank.com/team.php

Is JanusVM not being maintained because of XeroBank taking over?  It is dead
since 2007.  They say download removed for Debian, but keep donations
request and link to current Oct-19-2007:
http://www.janusvm.com/download.html

How can Tor become Trojan / Rootkit, this seems not possible?  How are
hackers allowed to break user computers and not be illegal?  Why is JanusVM
working for XeroBank?  Is there a safe Tor Virtual Machine to use?

I have many questions.  Thank you!
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20080610/4fef558d/attachment.htm>


More information about the tor-talk mailing list