I am running a hidden service website that uses user sessions made up from
individual visitors server variables. Unfortunately $_SERVER[ 'REMOTE_ADDR' ]
is reporting all visitors IPs as 127.0.0.1. Is there any way of
either detecting the last node IP address/apparent ip, to use in making up a
visit
>* mirimir:*> That depends. If it's drawing on random clueless Windows users,
>as most> botnets do, I don't see why it wouldn't show up in honeypots. If
>it's> not showing up, it might be a feature rollout. Or it might not really
>be> a physical botnet, but rather something very cleaver that loo
09:42 PM, Pokokohua wrote:
>
> See the "[tor-talk] Many more Tor users in the past week?" thread.
>
> It's an existing botnet that's being converted to Tor for C&C.
>
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other sett
Oh that makes so much more sense now ;) thanks for that.
On Fri, Sep 6, 2013 at 12:26 PM, mirimir wrote:
> On 09/05/2013 11:42 PM, Pokokohua wrote:
>
> > Still hard for me to imagine such a large scale infection of what I
> assume
> > is home user computers without anyon
Saw this ad/news item on another list
--
PrivateCore Demonstrates Industry’s First PRISM-Proof Tor Server in Public Cloud
PrivateCore, the private computing company, today demonstrated the
first cloud Tor server protected from NSA PRISM-like pro