On Tue, Nov 8, 2011 at 12:54 PM, Neusbeer <[email protected]> wrote: > Viewing his blog gave a new entry about this suggestion. > It's not gonna happen, and the gonna help the TORpeople. > http://cvo-lab.blogspot.com/2011/11/let-us-stop-with-buzz-on-tor.html Was anything interesting presented?
> Op 8-11-2011 16:47, not here schreef: > > That's a followUp! > TOR Attack isn't hype, and on 10th of november, mayhem will be released > don't troll, you fool. > > http://cvo-lab.blogspot.com/2011/11/tor-attack-technical-details.html > > ------------------------------------------------------------------------------------------------- > "Rumors of Tor's compromise are greatly exaggerated" > https://blog.torproject.org/blog/rumors-tors-compromise-are-greatly-exaggerated > > [[ Mohit Kumar ]] @ [[ 24/10/2011 16:31 > ]]-------------------------------------------------- >> French researchers from ESIEA >> <http://www.esiea.fr/c/en/Web.Esiea.Public.cuke?>, a French engineering >> school, have found and exploited some serious vulnerabilities in the TOR >> network. They performed an inventory of the network, finding 6,000 >> machines, many of whose IPs are accessible publicly and directly with the >> system’s source code. They demonstrated that it is possible to take control >> of the network and read all the messages that circulate. >> >> But there are also hidden nodes, the Tor Bridges, which are provided by >> the system that in some cases. Researchers have developed a script that, >> once again, to identify them. They found 181. "/We now have a complete >> picture of the topography of >> Tor/," said Eric Filiol. >> >> Read More at "The Hacker News" -- >> http://thehackernews.com/2011/10/tor-anonymizing-network-compromised-by.html _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
