1. 9
  1.  

  2. 5

    “If the attacker can add enough entry and exit relays to represent, say, 10 percent of Tor’s total entry-relay and exit-relay bandwidth respectively, then suddenly the attacker is able to de-anonymise about one percent of all Tor circuits via this kind of traffic analysis (10 percent x 10 percent).”

    In reality, if the attacker is the NSA, the easiest play would be for them to ask their valued telecom partners to put an appliance in their datacenter and route traffic from several dozen unused IPs across disparate subnets to it.

    I wonder how many Tor relays terminate in Ft. Meade.