diff options
author | Sean Whitton <spwhitton@spwhitton.name> | 2015-11-18 10:09:12 -0700 |
---|---|---|
committer | Sean Whitton <spwhitton@spwhitton.name> | 2015-11-18 10:09:12 -0700 |
commit | deb4807989d127e40e44c1192477c40e30f88180 (patch) | |
tree | 41e557cc82e01b0e76de8d4f548105023af8dfee /blog/entry/torweaknesses.mdwn | |
parent | 675d02fc2c3d2bfb53a81db6d2c55f0dfbbd79ed (diff) | |
download | wiki-deb4807989d127e40e44c1192477c40e30f88180.tar.gz |
imported PyBlosxom entries and comments
Diffstat (limited to 'blog/entry/torweaknesses.mdwn')
-rw-r--r-- | blog/entry/torweaknesses.mdwn | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/blog/entry/torweaknesses.mdwn b/blog/entry/torweaknesses.mdwn new file mode 100644 index 0000000..6225fb2 --- /dev/null +++ b/blog/entry/torweaknesses.mdwn @@ -0,0 +1,13 @@ +[[!meta date="2013-04-18 09:56:00"]] +[[!meta title="Weaknesses of Tor"]] +[[!tag imported_PyBlosxom tech security]] + +[Practical Vulnerabilities of the Tor Anonymity +Network](http://www.syverson.org/tor-vulnerabilities-iccs.pdf) + +> Lesson one is that Tor guards against traffic analysis not traffic +> confirmation. If there is reason to suspect that a client is talking +> to a destination over Tor, it is trivial to confirm this by watching +> them both. + +Good to know. |