TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Smart detection for passive sniffing in the Tor-network

90 pointsby dotchloealmost 9 years ago

2 comments

click170almost 9 years ago
If someone just has tcpdump running this won&#x27;t catch them unless they actually try to use the links or credentials they retrieved.<p>I like this, but from the title I expected to be able to detect that tcpdump is running, akin to what you can do with malformed ARP packets to detect a NIC in promiscuous mode.<p>Edit: in case anyone is wondering what I&#x27;m talking about - <a href="http:&#x2F;&#x2F;security.stackexchange.com&#x2F;questions&#x2F;3630&#x2F;how-to-find-out-that-a-nic-is-in-promiscuous-mode-on-a-lan" rel="nofollow">http:&#x2F;&#x2F;security.stackexchange.com&#x2F;questions&#x2F;3630&#x2F;how-to-find...</a>
评论 #11922735 未加载
tlrobinsonalmost 9 years ago
Tor should really just detect and block (or warn + prompt the user to allow) unencrypted connections. If you&#x27;re using Tor you probably also want end-to-end encryption.
评论 #11919174 未加载