Conversation
Notices
-
http://www.spiegel.de/media/media-35543.pdf Potential technique to Deanonymise users of Tor.. TOPSECRET #GCHQ #2011
-
A brief reading suggests that its about correlating timing of tor traffic when you can examine input to guard nodes ( because you own the network! ) and run an evil exit node.
-
http://www.spiegel.de/media/media-35538.pdf this covers the same attack but less detail https://indy.im/attachment/5764143
-