From liujihong at iie.ac.cn Wed Jan 13 06:01:13 2021 From: liujihong at iie.ac.cn (liujihong) Date: Wed, 13 Jan 2021 14:01:13 +0800 Subject: [Tox Support] New student of TOX Message-ID: <1F5EF418-5BAE-4018-84BB-225FC31E1FB3@iie.ac.cn> An HTML attachment was scrubbed... URL: From bo0od at riseup.net Wed Jan 13 11:55:27 2021 From: bo0od at riseup.net (bo0od) Date: Wed, 13 Jan 2021 11:55:27 +0000 Subject: [Tox Support] New student of TOX In-Reply-To: <1F5EF418-5BAE-4018-84BB-225FC31E1FB3@iie.ac.cn> References: <1F5EF418-5BAE-4018-84BB-225FC31E1FB3@iie.ac.cn> Message-ID: <06ee821c-4906-247e-169d-2f08b2d17bcc@riseup.net> No body gonna give you steps to do that, you need to figure that yourself. qTox and toxcore code available on github you can look at it, fork it and play with it. liujihong: > Hello, I'm a new student of TOX. Now?I want to implement a lightweight P2P > protocol in MicroBlaze. So I want to know where I should start learning and can > I transplant it successfully? > > > > liujihong > liujihong at iie.ac.cn > > > > ??? ?????? ?? > > > _______________________________________________ > Support mailing list > Support at lists.tox.chat > https://lists.tox.chat/listinfo/support > From peterarvo at hotmail.com Thu Jan 14 16:14:38 2021 From: peterarvo at hotmail.com (Peter Arvo) Date: Thu, 14 Jan 2021 16:14:38 +0000 Subject: [Tox Support] qTox for Windows 64-bit - Trojan detected in it Message-ID: Hi, After installing qTox using it a bit, it was left running in the background for several hours in which time my anti-virus/anti-malware detected what it identified as a Trojan from qTox trying to communicate to 194.61.26.205. If I do a search on that IP address it says it belongs to ERA LLC. and they are located in the Netherlands ( https://www.lookip.net/ip/194.61.26.205 ). It also looks like it is associated with Russia, see the WHOIS information https://www.lookip.net/whois/194.61.26.205 . This is where I downloaded the qTox software from: https://github.com/qTox/qTox/releases/download/v1.17.3/setup-qtox-x86_64-release.exe Thoughts? Thanks, Peter -------------- next part -------------- An HTML attachment was scrubbed... URL: From nurupo at tox.chat Thu Jan 14 23:35:40 2021 From: nurupo at tox.chat (nurupo) Date: Thu, 14 Jan 2021 18:35:40 -0500 Subject: [Tox Support] qTox for Windows 64-bit - Trojan detected in it In-Reply-To: References: Message-ID: <453daccebd2ec5b349ac04bb27601092@tox.chat> Hi, Tox is a peer-to-peer software, it forms an overlay network (DHT) with other Tox clients, so it shouldn't come as a surprise that your Tox client, qTox, constantly communicates with other Tox clients around the world, Russia included. In fact, if you open network monitor, you would see qTox communicating with tens, if not hundreds, of different IPs. My guess is that qTox triggered some sort of behavioral heuristic of the antivirus, perhaps the antivirus thought that communicating over UDP with so many different IPs is suspicious, or one of the IPs is on the antivirus's blacklist. You could try uploading qTox to VirusTotal, which scans files with many different antiviruses and presents you with the results. --- Regards, nurupo On 2021-01-14 11:14, Peter Arvo wrote: > Hi, > > After installing qTox using it a bit, it was left running in the > background for several hours in which time my anti-virus/anti-malware > detected what it identified as a Trojan from qTox trying to > communicate to 194.61.26.205. If I do a search on that IP address it > says it belongs to ERA LLC. and they are located in the Netherlands ( > https://www.lookip.net/ip/194.61.26.205 ). It also looks like it is > associated with Russia, see the WHOIS information > https://www.lookip.net/whois/194.61.26.205 . > > This is where I downloaded the qTox software from: > https://github.com/qTox/qTox/releases/download/v1.17.3/setup-qtox-x86_64-release.exe > > > Thoughts? > > Thanks, > > Peter > _______________________________________________ > Support mailing list > Support at lists.tox.chat > https://lists.tox.chat/listinfo/support