Testing TOR Nodes for Man-in-the-Middle Attacks

Discussion in 'privacy general' started by lotuseclat79, Nov 21, 2007.

Thread Status:
Not open for further replies.
  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    F-Secure Article here.

    -- Tom
     
  2. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    65,363
    Location:
    Texas
  3. Dogbiscuit

    Dogbiscuit Guest

    "TOR users are advised to always make use of additional encryption."
     
  4. phillip559

    phillip559 Registered Member

    Joined:
    Jan 4, 2008
    Posts:
    20
    Very good article.


    Before I intially used the Vidalia bundle a long time ago, I read quite a bit about the Tor network and besides the DNS leaks without a prog like Privoxy i remember the possibility of interception between your computer and the exit node.

    Ehh, scary stuff.
     
Loading...
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.