paint-brush
Shaping attacks in low latency networks, or why Tor won’t stop government agenciesby@3APA3A
1,866 reads
1,866 reads

Shaping attacks in low latency networks, or why Tor won’t stop government agencies

by Vladimir Dubrovin8mDecember 4th, 2017
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Because the potential de-anonymization of Tor users is being widely discussed throughout Internet, I’m publishing the “print” version of the abstract for my presentation from PHDays (Positive Hack Days) 2014 conference. The <a href="https://hackernoon.com/tagged/attack" target="_blank">attack</a> described below is not new, is not Tor-specific and can be used against any other low latency source-hiding tools like VPNs, proxy chains, or even a combination of many. Since there are more than 3 years passed, some implementation details could change, but general attack concept does not depend on implementation.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Shaping attacks in low latency networks, or why Tor won’t stop government agencies
Vladimir Dubrovin HackerNoon profile picture
Vladimir Dubrovin

Vladimir Dubrovin

@3APA3A

L O A D I N G
. . . comments & more!

About Author

Vladimir Dubrovin HackerNoon profile picture
Vladimir Dubrovin@3APA3A

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite