Good morning Jon,

 

In addition to fingerprint correlation and AS choice, I also recall reading this paper about identifying hidden services using clock skew based on internal CPU temperature: https://murdoch.is/papers/ccs06hotornot.pdf .  The paper is older, but I’m curious if such an attack method is still effective?

 

Make your day great,
Isaac Grover, Senior I.T. Consultant
Aileron I.T. – “ Because #ProactiveIsBetter ”

 

O: 715-377-0440, F:715-690-1029, W: www.aileronit.com 

 

LinkedIn: https://www.linkedin.com/in/IsaacGrover/

YouTube: https://www.youtube.com/channel/UCqrwZNFKdR-guKtuQzFPObQ