How are hackers breaking Tor and trojan users?

Arrakis arrakistor at
Tue Jun 10 18:18:25 UTC 2008


You're making assumptions. I can't reveal the details of the talk,
but the tor developers have been informed of this problem for a
long time. I understand you're excitement though, I'm anxious too.


krishna e bera wrote:
> You allege there is an exploitable flaw in current Tor versions 
> and have not informed Tor developers of details yet??
> I would hope DefCon does not accept presenters having such ethics.
> On Tue, Jun 10, 2008 at 12:50:10PM -0500, Arrakis wrote:
>> Yes, it can be done.
>> If the talk is accepted at DefCon, it will be demonstrated live.
>> MadAtTorHackers wrote:
>>> I read that hackers are breaking Tor and turning into a trojan/rootkit?  Is
>>> this possible?  How can they do this?
>>> In post:
>>> says XeroBank:

More information about the tor-talk mailing list