Regarding to recent debate about the use of Tor. Just wondering if it
is practical to trace back the user if he is using Tor to hide his
origin. As far as I know, there were several approaches using timing
correlation to trace back TCP connections. It seems that the technique
is there but the problem is the placement of monitors. Since the Tor
servers are scatter around the world and it is impractical to
access them all. If in a perfect world that you can monitor
all the traffic of all Tor servers, you should be able to trace back
with high success rate.
Is there any better solutions? Thanks.
yours,
Michael
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/