hey, there is a decent amount of academic research papers on this very question.
If I remember correctly the tor project homepage does offer some resources. Some of these papers are quite technical, but even as a non infosec professional I was able to get the basic concept most of the times. greets > On 24 Dec 2020, at 11:10 PM, BRBfGWMz <brbfgwmz@concealed.company> wrote: > > I am trying to guess what kind of target attacks are possible through > problematic relays. > > Suppose the network relay is controlled by the enemy. > > How do they determine the original IP address of the outbound traffic? > Correlation attacks are possible, but they seem very difficult and probably > require a lot of resources. Also, changing the route stops this. > > If I assume that they determine what traffic flow is mine, and that I always > use the same route, what attacks are possible? Are there any good posts or > videos? > > > > -- > Sent using MsgSafe.io's Free Plan > Private, encrypted, online communication > For everyone. www.msgsafe.io > _______________________________________________ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays