TCP stack attack?

Julie C julie at h-ck.ca
Sat Oct 23 19:42:11 UTC 2010


Has anyone come across any TCP stack implementation vulnerability research?
I am interested in reading about what has been tried, and what has not been
tried as yet. At this point in my education it strikes me that the TCP stack
on any Tor node could be altered to do malicious things, and no one would
ever know, or be able to know.

--
Julie C.
julie at h-ck.ca
GPG key FF4E2E70 available at http://keys.gnupg.net
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20101023/8b546752/attachment.htm>


More information about the tor-talk mailing list