Regarding to recent debate about the use of Tor. Just wondering if it is practical to trace back the user if he is using Tor to hide his origin. As far as I know, there were several approaches using timing correlation to trace back TCP connections. It seems that the technique is there but the problem is the placement of monitors. Since the Tor servers are scatter around the world and it is impractical to access  them all.  If in a perfect world that you can monitor all the traffic of all Tor servers, you should be able to trace back with high success rate.

Is there any better solutions? Thanks.

yours,
Michael

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to