[tor-talk] Bruce Schneier's Guardian Article about N_S_A and Tor.
williamwinkle at openmailbox.org
williamwinkle at openmailbox.org
Tue Jul 1 21:54:01 UTC 2014
On 2014-06-30 22:33, Geoff Down wrote:
> On Mon, Jun 30, 2014, at 10:15 PM, Bobby Brewster wrote:
>
>>
>> But how can the person's computer be identified since all that is seen
>> is
>> the connection between the exit node and the destination
>> target_website.com
>>
>> The point, surely, is that real time code injection should not be
>> possible since no-one can trace the connection from the exit node back
>> to
>> the user.
>>
>
> If the code is injected between the target_website.com and the exit
> node, the exit node will relay it faithfully back through the Tor
> network to the client.
> It's all just bytes to Tor.
>
This is presumably dependent on the TBB having a vulnerability. So, even
if all users of target_website.com were considered evil and should be
targeted, this could only happen if a) there was a 0-day for Firefox on
which TBB is based or b) there is a known vulnerability for Firefox but
certain users did not bother to update.
The injected code would only be able to discern the client's real IP if
the malware was successfully deployed and that would require the TBB to
be compromised.
Right?
More information about the tor-talk
mailing list