Possible attack method?? Question..
mcla0181 at umn.edu
Fri Jan 11 22:02:28 UTC 2008
(please correct me if I'm incorrect but...)
if the adversary controls your entry-guard (which is nearly impossible
to detect and considered a 'strong' adversary)
if the adversary controls input to your tunnel (like text in an email,
which is easy)
and, if you do not use end to end encryption,
Then, the adversary can perform traffic analysis on the exit node, and
the adversary can easily discover your true ip.
More information about the tor-talk