It's widely believed that an attacker with a sufficiently wide view of the 
Internet could unmask and identify Tor users. For example, if 3195 bytes go 
into a specific entry node and 3195 bytes come out of an exit node a few 
seconds later, chances are pretty good it's you.

I'm wondering if there are any ongoing efforts to get around this issue?

Thanks,
Anthony                                           
_______________________________________________
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to