After reading the paper it seems the attacker needs to inject html traffic into an unencrypted TCP connection, so not only it would be detectable by the client but also wouldn't work on Hidden Service traffic. Am I missing something?
> Professor Sambuddho Chakravarty, a former researcher at Columbia > University’s Network Security Lab and now researching Network > Anonymity and Privacy at the Indraprastha Institute of Information > Technology in Delhi, has co-published a series of papers over the last > six years outlining the attack vector, and claims a 100% ‘decloaking’ > success rate under laboratory conditions, and 81.4% in the actual > wilds of the Tor network. > > http://thestack.com/chakravarty-tor-traffic-analysis-141114 > https://mice.cs.columbia.edu/getTechreport.php?techreportID=1545&format=pdf > > Future defense work: dummy traffic padding > -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
