Ok, that is an interesting result. I ran a honey pot BBS for a while (kremvax) which was fun to watch folks try to break into but this is more unsettling. Given the exploitable javascript also talked about at the conference it seems like if you were in a tor node you might still be able to do the equivalent of the DNS hack where private addresses are inverse spoofed.
One of the things about radar guided missiles that interested me early on is that you pretty much have to have your radar on for them to work, and if you had a radar on you could find it and kill it (hence the variety of HAARM missiles). Similarly when people are trying to exploit our search engine it is hard to obfuscate since they have to include what they are trying to find in the search query in order for it to work. And now netwar requiring network traffic which has to return to the source to be useful.
One of the things about radar guided missiles that interested me early on is that you pretty much have to have your radar on for them to work, and if you had a radar on you could find it and kill it (hence the variety of HAARM missiles). Similarly when people are trying to exploit our search engine it is hard to obfuscate since they have to include what they are trying to find in the search query in order for it to work. And now netwar requiring network traffic which has to return to the source to be useful.