How to hack TOR? Possible scenario

Discussion in 'privacy technology' started by sorcerer666, Oct 28, 2013.

Thread Status:
Not open for further replies.
  1. sorcerer666

    sorcerer666 Registered Member

    Joined:
    Oct 24, 2013
    Posts:
    2
    Imagine an attacker has the ability to intercept all your traffic after it leaves your router.
    *Say they intercept it at the ISP level and is able to hijack it to a rogue server.
    * That rogue server acts as a fake TOR entry node.
    * When you try to establish a circuit, it provides your client with fake public keys for three non existing nodes and tricks it into beleiving you have a working tor circuit.
    * As you start browsing or sending data, since it already knows your three publick keys, it decrypts and logs all your activities and then forwards your packets to a real tor circuit it had previously established.
    * It logs the returning packets and forwards them encrypted to your client

    Could it work?
     
  2. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,103
    You should email this question to the boffins at torproject.org as they would be the most knowledgeable about the Tor technology. The email address is: tor-talk@lists.torproject.org

    -- Tom
     
Loading...
Thread Status:
Not open for further replies.