[tor-talk] Bruce Schneier's Guardian Article about N_S_A and Tor.

williamwinkle at openmailbox.org williamwinkle at openmailbox.org
Tue Jul 1 21:54:01 UTC 2014

On 2014-06-30 22:33, Geoff Down wrote:
> On Mon, Jun 30, 2014, at 10:15 PM, Bobby Brewster wrote:
>> But how can the person's computer be identified since all that is seen 
>> is
>> the connection between the exit node and the destination
>> target_website.com
>> The point, surely, is that real time code injection should not be
>> possible since no-one can trace the connection from the exit node back 
>> to
>> the user.
>  If the code is injected between the target_website.com and the exit
>  node, the exit node will relay it faithfully back through the Tor
>  network to the client.
> It's all just bytes to Tor.

This is presumably dependent on the TBB having a vulnerability. So, even 
if all users of target_website.com were considered evil and should be 
targeted, this could only happen if a) there was a 0-day for Firefox on 
which TBB is based or b) there is a known vulnerability for Firefox but 
certain users did not bother to update.

The injected code would only be able to discern the client's real IP if 
the malware was successfully deployed and that would require the TBB to 
be compromised.


More information about the tor-talk mailing list