[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
To Tor or not to Tor?
- To: APX 808 <[email protected]>
- Subject: To Tor or not to Tor?
- From: [email protected] (coderman)
- Date: Tue, 25 Mar 2014 18:49:10 -0700
- Cc: cpunks <[email protected]>
- In-reply-to: <CAFZYV3NTF8kfb=x1nP1uVaVShMgmFaENqgD2CM57e4ZQ6M4WMQ@mail.gmail.com>
- References: <3735791.WCR3VjPavv@lap> <[email protected]> <1720534.dfrF402S2Z@lap> <CAFZYV3NTF8kfb=x1nP1uVaVShMgmFaENqgD2CM57e4ZQ6M4WMQ@mail.gmail.com>
correct, an IP alone insufficient to impersonate a Tor node. you
would also need key material.
(active use of stolen keys to facilitate secondary attacks would be
interesting to inventory from leaks...)