Good pointing at this. Gets much too less attention.

You need much less wiretapping orders. Just one. Wiretap the internet
exchange point and get any Tor user.

Sampled Traffic Analysis by Internet-Exchange-Level Adversaries
http://petworkshop.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf

AS-awareness in Tor path selection
http://www.cs.rpi.edu/~edmanm2/ccs159-edman.pdf

LASTor: A Low-Latency AS-Aware Tor Client
http://www.cs.ucr.edu/~harsha/papers/oakland12.pdf

_______________________________________________
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to