How to hack TOR? Possible scenario

Discussion in 'privacy technology' started by sorcerer666, Oct 28, 2013.

Thread Status:
Not open for further replies.
  1. sorcerer666

    sorcerer666 Registered Member

    Oct 24, 2013
    Imagine an attacker has the ability to intercept all your traffic after it leaves your router.
    *Say they intercept it at the ISP level and is able to hijack it to a rogue server.
    * That rogue server acts as a fake TOR entry node.
    * When you try to establish a circuit, it provides your client with fake public keys for three non existing nodes and tricks it into beleiving you have a working tor circuit.
    * As you start browsing or sending data, since it already knows your three publick keys, it decrypts and logs all your activities and then forwards your packets to a real tor circuit it had previously established.
    * It logs the returning packets and forwards them encrypted to your client

    Could it work?
  2. lotuseclat79

    lotuseclat79 Registered Member

    Jun 16, 2005
    You should email this question to the boffins at as they would be the most knowledgeable about the Tor technology. The email address is:

    -- Tom
Thread Status:
Not open for further replies.