Researchers Demonstrate New Fingerprinting Attack on Tor Encrypted Traffic

This article has been indexed from The Hacker News

A new analysis of website fingerprinting (WF) attacks aimed at the Tor web browser has revealed that it’s possible for an adversary to glean a website frequented by a victim, but only in scenarios where the threat actor is interested in a specific subset of the websites visited by users.
“While attacks can exceed 95% accuracy when monitoring a small set of five popular websites, indiscriminate (

Read the original article: Researchers Demonstrate New Fingerprinting Attack on Tor Encrypted Traffic