On Wed, 2013-09-25 at 19:10 +0300, Joe wrote:
> Hi,
>
> I'm planning to run a Tor relay on a spare computer at home. Security is
> a concern, and not only regarding the machine running the relay but also
> my other computers. Are there any (theoretical or otherwise) known
> attacks a person can
Running a tor relay will increase your attack surface vis-a-vis the
internet in the same way that running any other internet-facing
service that could be owned (via, say, a buffer overflow) would.
In general, it is also common that once somebody has taken over a
machine inside your internal networ
On 9/25/2013 11:10 AM, Joe wrote:
> Hi,
>
> I'm planning to run a Tor relay on a spare computer at home. Security
> is a concern, and not only regarding the machine running the relay but
> also my other computers. Are there any (theoretical or otherwise)
> known attacks a person can perform on a ru
Hi,
I'm planning to run a Tor relay on a spare computer at home. Security is
a concern, and not only regarding the machine running the relay but also
my other computers. Are there any (theoretical or otherwise) known
attacks a person can perform on a running Tor relay to take remote
control o