[HOME] [DOWNLOAD] [DOCS] [NEWS] [SUPPORT] [TIPS] [ISSUES] [DONATE]

81% of Tor users can be de-anonymised by analysing router information

Quite disturbing article:
http://thestack.com/chakravarty-tor-traffic-analysis-141114

What do Whonix/Tor users think of this?

It is worth reading discussion of the paper here, including the comments:

https://blog.torproject.org/blog/traffic-correlation-using-netflows

http://archives.seul.org/tor/talk/Nov-2014/msg00249.html

Thank you, Dennis.

Very interesting read. Even though it doesn’t fill me with happiness and joy, atleast now that this vulnerability is out in the open, it will hopefully be addressed and now governments have one less method of attack.

Is there any form of defense against this? I read through the articles but I didn’t really see anything in terms of preventing detection. Would the use of a ddwrt router working as an encrypted VPN hub prevent this?
I know that using a VPN increases your attack surface, but thats not the question I’m asking.

[Imprint] [Privacy Policy] [Cookie Policy] [Terms of Use] [E-Sign Consent] [DMCA] [Investors] [Priority Support] [Professional Support]