"[...] Such a weakness could be used to launch targeted attacks that
track users’ online activity, forcibly terminate a communication, hijack
a conversation between hosts or degrade the privacy guarantee by
anonymity networks such as Tor.[...]"


https://ucrtoday.ucr.edu/39030

the research paper:
http://www.cs.ucr.edu/~zhiyunq/pub/sec16_TCP_pure_offpath.pdf
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to