More Secure Tor Browsing Through A Virtual Machine in Ubuntu

Curious Kid letsshareinformation at yahoo.com
Thu Aug 20 16:05:39 UTC 2009


Please excuse my extreme ignorance.

> Even if an attacker were to be able to gain
> command-line access through a vulnerability in a program such as
> Firefox, they still wouldn't be able to obtain the user's IP address,
> look at their file system, or gain access to any other
> personally-identifiable information.

Could this attacker create a Tor circuit specifying a malicious node as the entry node?

How is entropy gathered in virtual machines? Will it tell you if there is not enough entropy to support unpredictable routing and encryption? (Or is that even an issue at all with Tor?)

Thanks!



      



More information about the tor-talk mailing list