hey,
there is a decent amount of academic research papers on this very question.

If I remember correctly the tor project homepage does offer some resources.

Some of these papers are quite technical, but even as a non infosec 
professional I was able to get the basic concept most of the times.


greets

> On 24 Dec 2020, at 11:10 PM, BRBfGWMz <brbfgwmz@concealed.company> wrote:
> 
> I am trying to guess what kind of target attacks are possible through 
> problematic relays.
> 
> Suppose the network relay is controlled by the enemy.
> 
> How do they determine the original IP address of the outbound traffic? 
> Correlation attacks are possible, but they seem very difficult and probably 
> require a lot of resources. Also, changing the route stops this.
> 
> If I assume that they determine what traffic flow is mine, and that I always 
> use the same route, what attacks are possible? Are there any good posts or 
> videos?
> 
> 
> 
> --
> Sent using MsgSafe.io's Free Plan
> Private, encrypted, online communication
> For everyone. www.msgsafe.io
> _______________________________________________
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to