How to hack TOR? Possible scenario

Discussion in 'privacy technology' started by sorcerer666, Oct 28, 2013.

Thread Status:
Not open for further replies.
  1. sorcerer666

    sorcerer666 Registered Member

    Joined:
    Oct 24, 2013
    Posts:
    2
    Imagine an attacker has the ability to intercept all your traffic after it leaves your router.
    *Say they intercept it at the ISP level and is able to hijack it to a rogue server.
    * That rogue server acts as a fake TOR entry node.
    * When you try to establish a circuit, it provides your client with fake public keys for three non existing nodes and tricks it into beleiving you have a working tor circuit.
    * As you start browsing or sending data, since it already knows your three publick keys, it decrypts and logs all your activities and then forwards your packets to a real tor circuit it had previously established.
    * It logs the returning packets and forwards them encrypted to your client

    Could it work?
     
  2. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    You should email this question to the boffins at torproject.org as they would be the most knowledgeable about the Tor technology. The email address is: tor-talk@lists.torproject.org

    -- Tom
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.