> Example:
>
>
>
ok and then we have possible exit nodes. sounds like a large set.
proxy-detection-api doesn't sound quite like my thing.
OK, these aren't amazing resources. I think there are a couple papers out there with more ideas.
We may end up reviewing the tor source code and protocols and running some experiments.
A _really_ helpful behavior when deanonymising tor users is running a tor node yourself. Generally if you run an exit node you can mitm them directly to do this.