Hacker News new | past | comments | ask | show | jobs | submit login

How do you actually target the Tor gateway machine though?

Not the OP, and I don't know much about Tor's protocol, but at a guess one might start with deliberately malformed layers of the onion, so you route through a Tor entry node, the outer onion layer is removed, then the packet is forwarded to a Tor relay.

The Tor relay then unwraps the next layer of the onion, but the data within that layer is deliberately malformed to trigger a bug in the Tor code running on that relay.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: