[tor-talk] Netflow analysis breaks Tor

a akademiker1 at googlemail.com
Fri Nov 14 23:57:14 UTC 2014

After reading the paper it seems the attacker needs to inject html
traffic into an unencrypted TCP connection, so not only it would be
detectable by the client but also wouldn't work on Hidden Service
traffic. Am I missing something?

> Professor Sambuddho Chakravarty, a former researcher at Columbia
> University’s Network Security Lab and now researching Network
> Anonymity and Privacy at the Indraprastha Institute of Information
> Technology in Delhi, has co-published a series of papers over the last
> six years outlining the attack vector, and claims a 100% ‘decloaking’
> success rate under laboratory conditions, and 81.4% in the actual
> wilds of the Tor network.
> http://thestack.com/chakravarty-tor-traffic-analysis-141114
> https://mice.cs.columbia.edu/getTechreport.php?techreportID=1545&format=pdf
> Future defense work: dummy traffic padding

More information about the tor-talk mailing list