Good pointing at this. Gets much too less attention. You need much less wiretapping orders. Just one. Wiretap the internet exchange point and get any Tor user.
Sampled Traffic Analysis by Internet-Exchange-Level Adversaries http://petworkshop.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf AS-awareness in Tor path selection http://www.cs.rpi.edu/~edmanm2/ccs159-edman.pdf LASTor: A Low-Latency AS-Aware Tor Client http://www.cs.ucr.edu/~harsha/papers/oakland12.pdf _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk