RE: A Threat Actor Has Been Running Hundreds of Malicious Tor Relays Since 2017 01-14-2022, 03:25 PM
#13
(01-14-2022, 03:13 PM)Marshland Wrote:With sufficient control over a network you can do whatever you want.(01-14-2022, 03:04 PM)vittring Wrote:ooh thats interesting!. I assumed with everything https encrypted nowadays it would be much be difficult to alter traffic.(01-14-2022, 02:50 PM)Marshland Wrote: Honestly I had no idea this was possible. I wonder how they would be able to manipulate the traffic. Pretty scary stuffBy deep packet inspection (DPI) and editing sent packets as they're in transit from to or from exit node. Traffic isn't that hard to manipulate. You only need to fake the destination, pretend to be the sender or simply intercept the information and repackage it. Government has been doing this for decades at the request of the NSA to place backdoors in hardware components - sometimes during shipping - to their intended (presumably criminal) buyer. It's similar to that except on a software level which is much easier and costs a fraction of the time.
https://www.theverge.com/platform/amp/20...-plant-spy
https://techcrunch.com/2014/05/12/nsa-al...backdoors/
ed25519/0x21AB6B6A6CB2C337
C87D87466FD205945CF10A3821AB6B6A6CB2C337
C87D87466FD205945CF10A3821AB6B6A6CB2C337