[Cryptography] Are Tor hidden services really hidden?
crypto.jmk at gmail.com
Sun Mar 2 08:07:59 EST 2014
The Tor Users Get Routed paper does some pretty solid-looking calculations on how long it should take for a given attacker to deanonymize a given kind of user. For resourceful attackers, it's a lot shorter time than you'd think. I very much recommend the paper to everyone.
John Young has the paper up at http://cryptome.org/2013/08/tor-users-routed.pdf
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the cryptography