Once again: Tor timing attacks and a Tor confession
guninski at guninski.com
Sun Feb 28 23:46:56 PST 2016
Searching the web for "tor timing attacks" (without quotes)
returns too many hits.
Short summary and PoC is at .
At  Tor (and/or DoD) confess:
> The Tor design doesn't try to protect against an attacker who can see
> or measure both traffic going into the Tor network and also traffic
> coming out of the Tor network.
NSA and the like definitely can "see" traffic almost everywhere,
so Tor doesn't protect against the NSA, right? (some people learnt
this the hard way).
IMHO the first fucking thing Tor must do is to make the user click
at least three times on the above disclaimer.
Trying to make the rant on topic:
Is it theoretically possible at all to make low latency anonymity
of sufficiently decent quality?
PoC: End-to-end correlation for Tor connections using an active timing
More information about the cypherpunks