Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> but an entity with global network insight will always be able to correlate users by the timing of their transmissions alone.

For what it's worth, this type of adversary is explicitly excluded in Tor's threat model[0].

[0] https://svn.torproject.org/svn/projects/design-paper/tor-des...



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: