How are hackers breaking Tor and trojan users?

Arrakis arrakistor at gmail.com
Tue Jun 10 17:50:10 UTC 2008


Yes, it can be done.

If the talk is accepted at DefCon, it will be demonstrated live.



MadAtTorHackers wrote:
> I read that hackers are breaking Tor and turning into a trojan/rootkit?  Is
> this possible?  How can they do this?
> 
> In post: http://www.wilderssecurity.com/showpost.php?p=1257878&postcount=722
> says XeroBank:
> 
> * I saw something about a Tor exploit talk being planned for Defcon. I'll
>> assume that's where the s%*t is scheduled to hit the fan? *
>> The one scheduled so far isn't going to be anything I don't think. I have
>> serious doubts, considering the wording. Ours, if accepted, will truly
>> unmask tor users and turn tor into a trojan/rootkit.
>>
> 
> Is this XeroBank spreading fear to Tor without cause?  Or did hackers break
> Tor and create it a Trojan / Rootkit?
> 
> I see also JanusVM developer are working for XeroBank:
> http://xerobank.com/team.php
> 
> Is JanusVM not being maintained because of XeroBank taking over?  It is dead
> since 2007.  They say download removed for Debian, but keep donations
> request and link to current Oct-19-2007:
> http://www.janusvm.com/download.html
> 
> How can Tor become Trojan / Rootkit, this seems not possible?  How are
> hackers allowed to break user computers and not be illegal?  Why is JanusVM
> working for XeroBank?  Is there a safe Tor Virtual Machine to use?
> 
> I have many questions.  Thank you!
> 



More information about the tor-talk mailing list