<div dir="ltr"><br><div class="gmail_extra"><br><br><div class="gmail_quote">On Thu, Feb 13, 2014 at 9:04 PM, grarpamp <span dir="ltr"><<a href="mailto:grarpamp@gmail.com" target="_blank">grarpamp@gmail.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">People really should read the Tor documentation and try<br>
out the client alongside it before speculating on how it<br>
works, what it is good against or not, what has or hasn't<br>
happened to users and why, etc.<br>
<br>
<a href="https://www.torproject.org/" target="_blank">https://www.torproject.org/</a><br>
<a href="https://blog.torproject.org/" target="_blank">https://blog.torproject.org/</a><br>
<div class="HOEnZb"><div class="h5"><br></div></div></blockquote><div><br></div><div>If </div><div><br></div><div>1) The attacker controls multiple rendezvous points and</div><div>2) The attacker controls multiple clients, using them to make contact attempts and</div>
<div>3) Traffic to the hidden service with the drug site is an appreciable proportion of the total hidden service traffic</div><div><br></div><div>Then, a timing attack seems very likely to reveal the IP address of the exit node for the hidden service which can then be unrolled in turn.</div>
<div> </div></div><div><br></div>-- <br>Website: <a href="http://hallambaker.com/">http://hallambaker.com/</a><br>
</div></div>