![]() Then it sends it to the Virginia server, outside of Tor, to expose the users real IP address, and coded as a standard HTTP web request.Some visitors looking at the source code of the maintenance page realized that it included a hidden iframe tag that loaded a mysterious clump of Javascript code from a Verizon Business internet address located in Virginia. It looks up the victims MAC address and the victims Windows hostname. The strongest clue that the culprit is the FBI is that the malware does nothing but identify the target. The malware is designed specifically to attack the Tor browser. ![]() The US government may be behind an new malware attack against TOR networks. It's more the idea that just random people with a bit of basic IT knowledge could track and monitor you, with a few details such as IPs, MAC addresses, that i find creepy. TBH i dont really care if State Agencies could track me, as frankly they wouldn't bother, and i always assume if they ever would bother they'd gain full access to whatever interested them anyway. At 931pm I pulled the plug on all router and net cables (thus was given new IP), could you then gain access to my router with the old IP address? The one issue that i'm not really clear on is the first one - For example: if you got my dynamic IP address at 930pm tonight. Now after reading something about MAC addresses being used to track people, it has made me aware that they could potentially have got my MAC address and could now find my location via tracking, both now and in the future. I have since gone through the router and it seems nothing happened. Then later i read about Router Security, so secured the router, set a p/word, and checked for any signs of intrusion - there were none that i could see - firewall was enabled, nat, and WAP2. ![]() My ip is dynamic, and right away i pulled cable, switched off router (thus got new ip address, as i understand).
0 Comments
Leave a Reply. |