It's widely believed that an attacker with a sufficiently wide view of the Internet could unmask and identify Tor users. For example, if 3195 bytes go into a specific entry node and 3195 bytes come out of an exit node a few seconds later, chances are pretty good it's you.
I'm wondering if there are any ongoing efforts to get around this issue? Thanks, Anthony _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk