Please excuse my extreme ignorance.

> Even if an attacker were to be able to gain
> command-line access through a vulnerability in a program such as
> Firefox, they still wouldn't be able to obtain the user's IP address,
> look at their file system, or gain access to any other
> personally-identifiable information.

Could this attacker create a Tor circuit specifying a malicious node as the 
entry node?

How is entropy gathered in virtual machines? Will it tell you if there is not 
enough entropy to support unpredictable routing and encryption? (Or is that 
even an issue at all with Tor?)

Thanks!



      

Reply via email to