summaryrefslogtreecommitdiffhomepage
path: root/blog/entry/torweaknesses.mdwn
blob: 6225fb2c1b84676421aaca6260654571f9f8fd4d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
[[!meta date="2013-04-18 09:56:00"]]
[[!meta title="Weaknesses of Tor"]]
[[!tag  imported_PyBlosxom tech security]]

[Practical Vulnerabilities of the Tor Anonymity
Network](http://www.syverson.org/tor-vulnerabilities-iccs.pdf)

> Lesson one is that Tor guards against traffic analysis not traffic
> confirmation. If there is reason to suspect that a client is talking
> to a destination over Tor, it is trivial to confirm this by watching
> them both.

Good to know.