Some people say to track tor users there is a tool named raptor.
It uses the packet data recognition to track via AS the data streams
between tor hosts.
Can be a good idea to split, merge, change the packet order, the data
streams etc... to obfuscate the traffic with an algotithm to create
false d
All,
Our team at Princeton has been working on "Raptor: routing attacks on
privacy in Tor". These attacks can be launched by Autonomous System
(AS)-level adversaries, and exploit the dynamics of inter-domain routing.
We show that by exploiting routing asymmetry, routing churn, and routing
vulnerab