Testing TOR Nodes for Man-in-the-Middle Attacks

Discussion in 'privacy general' started by lotuseclat79, Nov 21, 2007.

Thread Status:
Not open for further replies.
  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,097
    F-Secure Article here.

    -- Tom
     
  2. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    57,763
    Location:
    Texas
  3. Dogbiscuit

    Dogbiscuit Guest

    "TOR users are advised to always make use of additional encryption."
     
  4. phillip559

    phillip559 Registered Member

    Joined:
    Jan 4, 2008
    Posts:
    20
    Very good article.


    Before I intially used the Vidalia bundle a long time ago, I read quite a bit about the Tor network and besides the DNS leaks without a prog like Privoxy i remember the possibility of interception between your computer and the exit node.

    Ehh, scary stuff.
     
Loading...
Thread Status:
Not open for further replies.