How are hackers breaking Tor and trojan users?

krishna e bera keb at
Tue Jun 10 18:08:48 UTC 2008

You allege there is an exploitable flaw in current Tor versions 
and have not informed Tor developers of details yet??
I would hope DefCon does not accept presenters having such ethics.

On Tue, Jun 10, 2008 at 12:50:10PM -0500, Arrakis wrote:
> Yes, it can be done.
> If the talk is accepted at DefCon, it will be demonstrated live.
> MadAtTorHackers wrote:
>> I read that hackers are breaking Tor and turning into a trojan/rootkit?  Is
>> this possible?  How can they do this?
>> In post:
>> says XeroBank:

More information about the tor-talk mailing list