[tor-talk] German police keylogger analysis (and the effects on Tor are....?)

Here is an article which details the German federal police's use of keyloggers. http://www.wired.com/threatlevel/2011/10/german-gov-spyware/ There are also links to Wired's coverage of the FBIs keylogger which are well worth a read. Keyloggers would, I assume, defeat the whole purpose of Tor since the URL would be recorded and sent to the fedz. How to overcome? My impression is that no-one is sending .exe attachments these days but rather exploiting unpatched browsers by tricking people to visiting a site (although of course they can always install it manually). I suppose that up-to-date anti-virus and anti-malware might help if you are on Windows. And, of course, using NoScript and blocking Flash and suchlike. What would be the situation if you are using Linux (such as Ubuntu for example). I realise that keyloggers must exist for Linux but would they be more difficult to install? Is moving to Linux one solution? _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
participants (1)
-
William Wrightman