There are some interesting papers on TOR anonymity, not really sure if all of them have been addressed.
Some: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6407715&queryText%3Dtor http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6132443&queryText%3Dtor+cell The cell based one is pretty fun. 2014-03-07 10:32 GMT+00:00 Maimun Rizal <maimun.ri...@googlemail.com>: > Dear All, > > is there any attack can be break anonymity in TOR network? if so, how? > > I assume, if I want to break anonymity in the TOR network, I should take > control all of relays which are used by sender and destination as a > transmission media. > with this assumption, It is easy to show the differences attacker > probability in TOR network 2 relays or more relays. > > some papers explained that TOR network can be broke by attacker take > control in entry and exit relays. so what differences if we use more relays > on path-link? > > even there is attacker only need entry relays to break anonymity in TOR > network. so the path-link does not affect the level of anonymity. > > where I can find the source explanation the kind of attacks that related > with path-link of the TOR network? > > or how can we show it, with less relays on path-link will have less > anonymity? > > if no differences, why TOR network use 3 TOR relays instead of 2 TOR relays > in path-link? > > Thank you for advanced, > > Regards, > MR > -- > tor-talk mailing list - tor-talk@lists.torproject.org > To unsubscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk