Re: Odd tor spam - Storm Worm

2007-09-06 Thread Dave Jevans
Good write-up of the Tor storm worm variant at f-secure blog http://www.f-secure.com/weblog/#1272 For those not tracking the storm worm... this has been one of the most prolific worms of recent months. It's the same thing behind the fake youtube emails, e-greeting card infections and th

Re: Building tracking system to nab Tor pedophiles

2007-03-06 Thread Dave Jevans
I've seen a VM that routes all traffic over TOR, invisibly to the O/S. (Not sure what they do about UDP). Developed at Georgia Tech. On Wed, Mar 07, 2007 at 12:56:22AM -0500, James Muir wrote: > http://blogs.zdnet.com/security/?p=114 The approaches suggested won't work if you use Firefo

Re: How would tor defend from this attack?

2007-03-06 Thread Dave Jevans
Your proposal is quite realistic, though to get good bi-directional bandwidth would probably cost a lot more than you project, as you'd want colocated servers, not servers on DSL lines. I believe that the exit nodes are one of the weakest points in a Tor network. If you don't know who is op

Privoxy and Java Re: Building tracking system to nab Tor

2007-03-06 Thread Dave Jevans
Privoxy routes DNS through TOR. Question: does Java in a browser run through the browser's IP stack? If so, its DNS packets would go through the SOCKS proxy and Privoxy, then TOR. Right? At 9:46 PM -0800 3/6/07, Michael_google gmail_Gersten wrote: Well, first, this is just the normal exit