Flutterby™! : TOR compromising binaries

Next unread comment / Catchup all unread comments User Account Info | Logout | XML/Pilot/etc versions | Long version (with comments) | Weblog archives | Site Map | | Browse Topics

TOR compromising binaries

2014-10-24 16:00:47.662694+00 by Dan Lyke 0 comments

TOR exit node that's hot-patching binaries with malware.

At DerbyCon this year I gave a presentation of my binary patching framework, BDF. Many binaries are hosted without any transport layer security encryption. Some binaries are signed to prevent modification, but most are not. During that presentation, I talked about the MITM patching of binaries during download, and showed how easy it was using BDFProxy. I also mentioned that similar techniques are probably already in use on the Internet.

I had only circumstantial evidence until recently.

[ related topics: Weblogs Movies Law Net Culture Cryptography ]

comments in ascending chronological order (reverse):