TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Smart detection for passive sniffing in the Tor-network

90 点作者 dotchloe将近 9 年前

2 条评论

click170将近 9 年前
If someone just has tcpdump running this won&#x27;t catch them unless they actually try to use the links or credentials they retrieved.<p>I like this, but from the title I expected to be able to detect that tcpdump is running, akin to what you can do with malformed ARP packets to detect a NIC in promiscuous mode.<p>Edit: in case anyone is wondering what I&#x27;m talking about - <a href="http:&#x2F;&#x2F;security.stackexchange.com&#x2F;questions&#x2F;3630&#x2F;how-to-find-out-that-a-nic-is-in-promiscuous-mode-on-a-lan" rel="nofollow">http:&#x2F;&#x2F;security.stackexchange.com&#x2F;questions&#x2F;3630&#x2F;how-to-find...</a>
评论 #11922735 未加载
tlrobinson将近 9 年前
Tor should really just detect and block (or warn + prompt the user to allow) unencrypted connections. If you&#x27;re using Tor you probably also want end-to-end encryption.
评论 #11919174 未加载