"[...] Such a weakness could be used to launch targeted attacks that track users’ online activity, forcibly terminate a communication, hijack a conversation between hosts or degrade the privacy guarantee by anonymity networks such as Tor.[...]"
https://ucrtoday.ucr.edu/39030 the research paper: http://www.cs.ucr.edu/~zhiyunq/pub/sec16_TCP_pure_offpath.pdf -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk