Hacker News new | past | comments | ask | show | jobs | submit login

How so? Please explain.



If you use Tor the same way you have used a regular browser there could be an 'image' of your online habits to compare with (not applicable within the darknet).

But if the user doesn't use it in the same way, the likely attack in most cases is traffic correlation. This works by having large visibility over entry nodes and visibilty over the final destination (ex: a website). Given enough activity and time you can by process of elimination deanonimize the user's ip.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: