View Single Post
Ikke rart du tror det er en teori når du ikke vet ikke hvilken rapport jeg snakker om.

Her:
http://www.reddit.com/r/onions/comme...ces_and_shown/

Jeg siterer:
We have analyzed the security properties of Tor hidden services and shown that attacks to deanonymize hidden services at a large scale are practically possible with only a moderate amount of resources. We have demonstrated that collecting the descriptors of all Tor hidden services is possible in approximately 2 days by spending less than USD 100 in Amazon EC2 resources. Running one or more guard nodes then allows an attacker to correlate hidden services to IP addresses using a primitive traffic analysis attack.