Apparently there is/was a legitimate anonymity threat from Tor-relay level adversaries when a user runs Bittorrent for an extended time.[1] The paper is old and padding may have significantly ameliorated this.
-
@Patrick Does an application’s exit choice stay static according to the destination’s IP staying the same or by connection lifespan? Trying to figure out if using a VPN for a torrent download’s lifespan limits the exit changing vs not using one.
-
@idk Do you know if I2P supports SOCKS proxies/ stream isolation easily?
The differences in security between user models is due primarily to two factors: (i) the amount of user activity and (ii) the destination addresses and ports. Creating many streams increases the number of opportunities to choose malicious relays, and thus the speed at which that occurs, while connecting to destinations that are disallowed by many exits increases the chance that a selected exit relay will be malicious.
EDIT: I edited my questions above because I was confusing IsolateDest behavior with stream isolation. Stream isolation limits all of an application’s traffic over the same three hop path while IsolateDestAddr would shard an apps traffic according to every IP it is contacting.