hey,
there is a decent amount of academic research papers on this very question.

If I remember correctly the tor project homepage does offer some resources.

Some of these papers are quite technical, but even as a non infosec professional I was able to get the basic concept most of the times.


greets

On 24 Dec 2020, at 11:10 PM, BRBfGWMz <brbfgwmz@concealed.company> wrote:

I am trying to guess what kind of target attacks are possible through problematic relays.

Suppose the network relay is controlled by the enemy.

How do they determine the original IP address of the outbound traffic? Correlation attacks are possible, but they seem very difficult and probably require a lot of resources. Also, changing the route stops this.

If I assume that they determine what traffic flow is mine, and that I always use the same route, what attacks are possible? Are there any good posts or videos?



--
Sent using MsgSafe.io's Free Plan
Private, encrypted, online communication
For everyone. www.msgsafe.io
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays