lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon Jun 12 15:49:13 2006 From: jqxin2006 at gmail.com (Jianqiang Xin) Subject: Is there a way to trace back Tor user Regarding to recent debate about the use of Tor. Just wondering if it is practical to trace back the user if he is using Tor to hide his origin. As far as I know, there were several approaches using timing correlation to trace back TCP connections. It seems that the technique is there but the problem is the placement of monitors. Since the Tor servers are scatter around the world and it is impractical to access them all. If in a perfect world that you can monitor all the traffic of all Tor servers, you should be able to trace back with high success rate. Is there any better solutions? Thanks. yours, Michael -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060612/338d2816/attachment.html
Powered by blists - more mailing lists